Threat Database Ransomware Sage 2.0 Ransomware

Sage 2.0 Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Ranking: 16,955
Threat Level: 100 % (High)
Infected Computers: 1,121
First Seen: December 5, 2016
Last Seen: September 9, 2023
OS(es) Affected: Windows

The Sage 2.0 Ransomware is a ransomware Trojan that updates Sage, an already existing ransomware Trojan. The Sage 2.0 Ransomware carries out a typical ransomware attack, encrypting the victims' files and demanding the payment of a ransom. The files encrypted by the Sage 2.0 Ransomware will have the extension '.sage' added to the end of the file name. The Sage 2.0 Ransomware delivers its ransom note in an HTML file named 'Recovery_[3_random_characters].html,' which is dropped in each directory where files were encrypted. The Sage 2.0 Ransomware also demands its ransom by changing the infected computer's Desktop image into a ransom note.

The Outrageous Sum Demanded by the Sage 2.0 Ransomware

The Sage 2.0 Ransomware's ransom note informs the victim of the attack and demands the payment of $2000 USD in BitCoin. The Sage 2.0 Ransomware uses a strong encryption method and, unfortunately, the files that the Sage 2.0 Ransomware encrypts cannot be recovered without the decryption key (which the con artists will hold in their possession). The Sage 2.0 Ransomware's ransom is paid through a website, which is linked in the Sage 2.0 Ransomware's ransom note. The Sage 2.0 Ransomware claims that if the ransom isn't paid within a certain time frame, the decryption key will be deleted, which will doom the victim's files forever. PC security researchers strongly advise against paying the Sage 2.0 Ransomware ransom, since there is little chance that the con artists will keep their promise to restore the victim's files. The best protection against threats like the Sage 2.0 Ransomware is to have file backups on the cloud or an external memory device.

How the Sage 2.0 Ransomware Carries out Its Attack

The Sage 2.0 Ransomware is virtually identical to countless other ransomware Trojans. Fortunately, since the Sage 2.0 Ransomware has gone through various iterations, the content associated with the attack has become fairly well-known among PC security researchers. After the Sage 2.0 Ransomware changes the victim's Desktop image, it replaces it with the following message:

'Need help with translation?? Use https://translate.google.com
ATTENTION! ALL YOUR FILES WERE ENCRYPTED!
PLEASE READ THIS MESSAGE CAREFULLY
All your important and critical files as well as databases, images and videos and so on were encrypted by software known as SAGE!
SAGE 2.0 uses military grade elliptic curve cryptography and you have no chances restoring your files without our help!
But if you follow our instructions we guarantee that you can restore all your files quickly and safely!
To get the instructions open any of this temporary links m your browser:
This links are temporary and will stop working after some time, so if you can't open these links, you can use TOR Browser
The TOR Browser is available on the official website https://www.torproiect.org/
Just open this site, click on the "Download Tor" button and follow the installation instructions, then use it to open the following link:
Please be sure to copy this instruction text and links to your notepad to avoid losing it.
This crypto ransomware encrypts user data using the AES, and then calls go to the Tor-site to pay a ransom in Bitcoin and get instructions on how to return the files. Redemption amount: $ 2,000 (~ 2.15550 Bitcoin). After 7 days, the amount of foreclosures doubled.'

Victims of the Sage 2.0 Ransomware attack are redirected to a website hosted on the anonymous TOR network. When victims land on the website, they will be greeted with the following message:

'Important Information! Please read very carefully!
Attention!
Sage 2.0 encrypted all your files!
All your files, images, videos and databases where have been encrypted and no longer accessible by software known as Sage 2.0!
To restore all your files you need to pay $2000 (≈2.17965) for the decryption.
The after full payment, you will be able to download the software to restore your data.
In the case of non-payment of the full commission within 5d 05h,
the amount of commission will be raised to $4000 (≈4.35929)
You have no chance to restore the files without our help!
The files will restored easily if you will follow our instructions!
In case of the repeated non-payment of the increased commission during the 5d 05h period,
the unique decryption code for your files will be blocked
and its recovery will be absolutely impossible!'

The Sage 2.0 Ransomware payment website includes an additional message with more specific instructions on how to pay the Sage 2.0 Ransomware ransom. The following is the text displayed in this 'Payment' page:

'Payment procedure How to pay?
Payment can only be made using the BitCoin system.
So you can be sure that in the case of full payment of the commission, all your files will be decrypted.
Please note that BTC currency rate as any other currency rate in the world is not fixed. It tends to increase, therefore we advise you not to delay the BTC currency purchase and payment.
If you want to learn more what is Bitcoin, then watch this YouTube Video or visit WeUseCoins website.
How to pay within the BitCoin system?
Don't worry, the payment process in the BitCoin system is not difficult and requires few simple steps.
First of all, you need to create your Bitcoin currency (BTC) wallet.
We recommend to use most popular and easy-to-use online BlockChain.info wallet.
Or you can install Electrum software wallet for any OS you need
Next, you need to top-up your Bitcoin wallet's balance.
Below is the list of trusted services where you may buy Bitcoin. These services absolutely are not related to us!
If you can't find the option that suits you, then maybe you need to try find the solution in Google?
To receive the payment from you, we have created the unique Bitcoin wallet.
Further you need to make transaction from your own Bitcoin-wallet to the Bitcoin-wallet which we have prepared for you.
You can see it below (large font).
This wallet has been created especially for you and the amount paid can not be lost!
Send 2.17965 to the following wallet: 1EjHLfL5yy4o7pjG7sfvPrQfPwfMtVT4J8
If you already made the partial payment before, you can see there the remaining amount that you need to pay.
If you need to save or copy your BTC wallet address don't try to write it down by hand.
If while making the transaction you type the wrong BTC wallet number, the money will be lost!
Therefore, if necessary, print out the BTC wallet address you need or use the QR-code scanner on your smartphone/tablet.
Keep in mind that some Bitcoin purchase services are not work in real time and have the delay in payment processing.
The delay may last from 1 to 36 hours.
We therefore recommend you not to put aside the decision of payment until the last moment. Failure to pay on time may result in the increase of the payment amount!
After full payment you can download the decryption software from the Instructions section and use it with your personal decryption key.
We guarantee that all your files will be decrypted.
Note: Due to the configuration of some browsers simply reload this page does not always update the current information.
Please logout and relogin into your account to check the actually decryption status.'

The Sage 2.0 Ransomware displays instructions for the victim to decrypt the files 'helpfull.' These instructions are typical of these attacks. Unfortunately, without the decryption application, they will not be useful for computer users to recover from the Sage 2.0 Ransomware attack. Below are the instructions presented in the 'Instructions' page:

'Instructions What to do after the payment is made? How to decrypt all your data?
After payment you can download the decryption software from the home page. We guarantee that all your files will be decrypted.
Just follow these simple steps:
1. Login to your personal page
2. Copy the decryption key from field on the home page
3. Click "Download decryption software" button and save Sage2Decrypter.exe to your hard disk
4. Run Sage2Decrypter.exe
5. Paste the decryption key into "Key code" field in the decryption software window.
6. Select folder or disk you want to decrypt.
7. Click "Decrypt" button and wait for successfully completion of the decryption process
8. IMPORTANT: Don't turn off or reboot your PC before the process is completed!
9. Congratulations! Now all your files are restored!'

Similarly to legitimate software and operations, the Sage 2.0 Ransomware also includes a 'Support' page. The following is the full text of the Sage 2.0 Ransomware 'Support' page:

'If you still have some questions on the work of our service, please use the special form to contact our support service.
We will be glad to answer any questions you may have.
Note: Due to the configuration of some browsers simply reload this page does not always update the current information.
Please logout and relogin into your account to check the actually decryption status.'

The people responsible for the Sage 2.0 Ransomware have updated this threat regularly, making slight changes to its ransom notes and attack patterns, including small stylistic changes such as the color of the font used in the ransom notes or the design of the ransom note.

SpyHunter Detects & Remove Sage 2.0 Ransomware

File System Details

Sage 2.0 Ransomware may create the following file(s):
# File Name MD5 Detections
1. f1.hta da3fc4dc0cab7127d2228eea660def92 91
2. f1.hta 69ffb32f0a73e94492e1de2759ec4e47 58
3. f1.hta 0e962b17327cf256a7a9aac36bcc2e73 42
4. f1.hta 3d2a8e8b0c01ee4c0bafc49feb66dcf8 39
5. f1.hta 3d06a605002f0804b7ee4b28b5b0add1 38
6. f1.hta cef78bb8b23c09271a714810bee83ead 37
7. f1.hta 9ac24a74c5fb285bda11a36f2572f358 30
8. f1.hta f043948461a12b1013c69cb0f9202db9 25
9. f1.hta 996df93357dd6b84ff3f4bb776799008 22
10. f1.hta ba63852da88e3217747e246c13f0b350 22
11. f1.hta 5b665ea43bb8bd2752c2a676aec9095d 22
12. f1.hta 2df49f17d4b5faadebd80e0ba8abd64c 14
13. f1.hta 75e0befbf9f654183f8fd28b568df045 13
14. f1.hta 56c72facc278384e05dc2f7aa0eab860 13
15. f1.hta 793dbbc4261f681a5d204e8e196d11bc 12
16. f1.hta 4856de358dd83e9562b0864c7d1ed40c 12
17. f1.hta 5760263e095cd4fec28a0d8a5b3a8e2a 12
18. !HELP_SOS.hta b98ea223d2147b74a151614b756a84fd 11
19. f1.hta e00e17e5c7525ed68e1b660239a81e3f 10
20. f1.hta e68e9dfeb02037693858df00008d0af0 10
21. f1.hta 5947e68e4358be02cd264a68bc8e22c3 10
22. !HELP_SOS.hta f6339a90d5a71c514a1d1aeeeb44829c 10
23. f1.hta 22dda250b1f467bdc19d4075c9da1327 10
24. !HELP_SOS.hta 557ae920ab0898fba2a5b05ea3167ab5 4
25. !HELP_SOS.hta 7dfb4582aec404f6ec68614a476cb178 4
26. !HELP_SOS.hta a8c342224490fb8a30616ded6d030622 1
27. !HELP_SOS.hta b339f1cdfd77aeb604727798e33af202 1
28. file.exe c167732d2390deb95b081c97caf23cc2 0
More files

Registry Details

Sage 2.0 Ransomware may create the following registry entry or registry entries:
File name without path
!HELP_SOS.hta
Regexp file mask
%APPDATA%\f[NUMBERS].hta

Trending

Most Viewed

Loading...