Threat Database Ransomware Strawhat Ransomware

Strawhat Ransomware

By GoldSparrow in Ransomware

The Strawhat Ransomware is an encryption ransomware Trojan. These infections are used to extort computer users. Ransomware Trojans take the victims' files hostage, encrypts them with a strong encryption algorithm and then stipulates a ransom to provide the decryption key that is required to recover the affected files. Threats like the Strawhat Ransomware are quite harmful since they will make the files inaccessible permanently. Because of this, computer users should take preventive measures to protect their files from these attacks (such as establishing a good backup system on the cloud or an external server).

This Straw Hat Ransomware Prevent You from Accessing Your Files

The Strawhat Ransomware was first observed on online anti-virus platforms, which are often used by threat creators to test whether their threats can evade detection by anti-virus programs. The Strawhat Ransomware has not been released publicly yet, although it may start appearing in the wild in early September. However, ransomware Trojans like the Strawhat Ransomware are increasing their presence in the current threat ecosystem substantially, and computer users should protect their files against these threats. The Strawhat Ransomware works in a way that's similar to most other encryption ransomware Trojans. The Strawhat Ransomware will encrypt the victims' files and then demand the payment of a ransom. The Strawhat Ransomware will the rename files encrypted by the attack by adding a string of random characters to the end of the file's name as an extension. Although it is likely that the final released version of the Strawhat Ransomware will be capable of carrying out full-fledged ransomware attacks, the version of the Strawhat Ransomware observed on online anti-virus platforms does not support strong encryption standards and is not capable at this time of carrying out a functional ransomware attack. In its attack, the Strawhat Ransomware only renames the files but keeps their data intact. The Strawhat Ransomware targets the following file types in its infection process currently:

.wma, .flv, mkv, .mov, .avi, .mpeg, .mpg, .wmv, .mdb, .sql, .sqlite3, .pptm, .xltm, .xlsm, .xml, .dotm, .dot, .xlm, .dotx, .csv, .pem, .csr, .crt, .key, .mp4, .pptx.

After encrypting the victim's files, the Strawhat Ransomware will display a ransom note, which includes a pirate flag written using ASCII characters. The Strawhat Ransomware also will change the affected computer's desktop image into a copy of the Strawhat Ransomware ransom note. The full text of the Strawhat Ransomware's ransom note reads:

'YOU BECAME VICTIM OF the Strawhat Ransomware!
The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special decryption program.
Now you should send us email with your personal identifier. This email will be as confirmation you are ready to pay for decryption key. You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.
Contact us for payment instructions and after you paid we will send you the decryption tool that will decrypt all your files.
Personal identifier: [34 RANDOM CHARACTERS]
Contact email address: [EMAIL ACCOUNT]'

Dealing with a Strawhat Ransomware Infection

Computer users are advised against contacting the Strawhat Ransomware's creators or following the instructions in the Strawhat Ransomware's ransom note. Instead, the need to take steps to protect their data preemptively. Since the Strawhat Ransomware does not encrypt the victims' files yet, it is possible to restore the affected files by renaming them to their former state. It may be possible to recover from a Strawhat Ransomware attack by using the System Restore, by rolling back Windows to a previous System Restore point. Remember that even though the Strawhat Ransomware does not carry out a functional ransomware attack, there are plenty of ransomware Trojans active currently that do, making preventive measures like file backups and security software more important than ever.

Trending

Most Viewed

Loading...