Threat Database Ransomware Runsomewere Ransomware

Runsomewere Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 1
First Seen: November 28, 2016
Last Seen: April 3, 2020
OS(es) Affected: Windows

The Runsomewere Ransomware is an encryption ransomware Trojan that is based on the infamous Hidden Tear project, an open source 'educational' ransomware engine that spawned a large number of ransomware attacks. If the Runsomewere Ransomware managed to encrypt your files, you can restore them from a backup and remove the Runsomewere Ransomware completely. The Runsomewere Ransomware carries out a typical encryption ransomware attack, encrypting the victim's files and then asking for the payment of a ransom.

The Devasting Effects of the Hidden Tear Project Release

The Hidden Tear project, released publicly by Otku Sen, was ultimately a catastrophic event for malware researchers since it spawned countless encryption Trojans that were released in 2016. The fact that a ransomware engine as powerful as Hidden Tear was made publicly available meant that con artists without the necessary resources or technical expertise could now access powerful threats and create countless threat variants like the Runsomewere Ransomware. The Runsomewere Ransomware is being distributed using corrupted spam email messages currently. These corrupted spam email messages may use social engineering tactics to convince computer users to download and run an attached file. For example, the email may appear to have been sent by a social media platform like Instagram, a bank, or a delivery company like FedEx or DHL. The attached file will exploit vulnerabilities in software, such as a poorly implemented macro functionality, to download and install the Runsomewere Ransomware or other threats on the victim's computer.

How the Runsomewere Ransomware Attack Works

The Runsomewere Ransomware receives its name because of a line of code in the Runsomewere Ransomware's executable file. It is possible that it is simply a misspelling of the words 'Runsomewhere,' or 'run somewhere.' The Runsomewere Ransomware infection changes the victim's Desktop image to a picture of the iconic doll from the Jigsaw films. However, this does not mean that there is a connection between the Runsomewere Ransomware and the Jigsaw Ransomware infection that was first observed in early 2016. Like most ransomware Trojans that are being distributed simultaneously in November of the Runsomewere Ransomware, uses the AES-256 encryption to make the victim's files inaccessible, targeting files in the default user library, in the following directories:

%UserProfile%\Desktop
%UserProfile%\Downloads
%UserProfile%\Documents
%UserProfile%\Pictures
%UserProfile%\Music
%UserProfile%\Videos

The Runsomewere Ransomware will try to encrypt certain file types, targeting spreadsheets, text documents, eBooks, audio files, videos, images, and other files that could have value to the computer user. In the Runsomewere Ransomware attack, the following file types will become encrypted and will no longer be able to be accessed on the victim's computer:

.3GP, .7Z, .APK, .AVI, .BMP, .CDR, .CER, .CHM, CONF, .CSS, .CSV, .DAT, .DB, .DBF, .DJVU, .DBX, .DOCM, ,DOC, .EPUB, .DOCX .FB2, .FLV, .GIF, .GZ, .ISO .IBOOKS,.JPEG, .JPG, .KEY, .MDB .MD2, .MDF, .MHT, .MOBI .MHTM, .MKV, .MOV, .MP3, .MP4, .MPG .MPEG, .PICT, .PDF, .PPS, .PKG, .PNG, .PPT .PPTX, .PPSX, .PSD, .RAR, .RTF, .SCR, .SWF, .SAV, .TIFF, .TIF, .TBL, .TORRENT, .TXT, .VSD,.WMV, .XLS, .XLSX, .XPS, .XML, .CKP, ZIP, .JAVA, .PY, .ASM, .C, .CPP, .CS, .JS, .PHP, .DACPAC, .RBW, .RB, .MRG, .DCX, .DB3, .SQL, .SQLITE3, .SQLITE, .SQLITEDB, .PSD, .PSP, .PDB, .DXF, .DWG, .DRW, .CASB, .CCP, .CAL, .CMX, .CR2.

The Payment of a Ransom is Never Recommended

Although the people responsible for the Runsomewere Ransomware claim that they can decrypt your files if you pay a ransom, PC security analysts strongly advise against paying the Runsomewere Ransomware's ransom. Paying these ransoms allows con artists to continue creating and distributing these threats. In many cases, con artists will not deliver the decryption utility after the victim has paid. They are equally likely to ignore the victim, ask for more money, or simply deliver a decryption key that does not work. Because of this, preventive measures should be taken. The best way to prevent the Runsomewere Ransomware attacks and ensure that you can recover quickly is to have backups of all files and update these backups regularly.

Trending

Most Viewed

Loading...