Threat Database Ransomware Tornado Ransomware

Tornado Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 314
First Seen: April 10, 2024
Last Seen: January 26, 2026
OS(es) Affected: Windows

The Tornado Ransomware is another generic crypto-threat, which appears to mimic the behavior of the DCRTR Ransomware and the '.twist File Extension' Ransomware. The Tornado Ransomware payload is injected into systems via phishing emails and users are urged to run a corrupted macro believing it is supposed to improve the rendering of a text document. The threat at hand is programmed to encipher the user-generated content, and it may cripple database management on entry-level servers. Research on test machines showed that the Tornado Ransomware is designed to encipher common file types associated with Microsoft products, media players, image viewers and open-source office suits. The encrypted files are easy to recognize by the '[].Tornado' extension. For example, 'Porpoises.jpeg' is renamed to 'Porpoises.jpeg[helpcrypt@airmail.cc].Tornado' and you should not expect to load the image in any image viewer before decoding the file. The ransom note is exhibited to the desktop as 'key.txt' and reads:

'All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail: helpcrypt@airmail.cc.You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files.In case of no answer in 48 hours write us to theese e-mails: supphelp@cock.li
[512 RANDOM CHARACTERS]'

The threat actors are reported to operate the 'helpcrypt@airmail.cc' and the 'supphelp@cock.li' email accounts, which victims are suggested to contact if they find 'key.txt' on their desktops. At least that is what the Ransomware operators are hoping you would do. We advise against communications with the 'helpcrypt@airmail.cc' and the 'supphelp@cock.li' email accounts. You can rebuild your data without paying hundreds of dollars to a Bitcoin wallet by booting system recovery disks, loading backups and accessing cloud-based services such as Google Drive, Spider Oak, Mega and Dropbox. It is recommended to clean the infected devices with the help of a respected anti-malware product. The objects created by the Tornado Ransomware are likely to be marked by AVs with the following names:

  • Generic.Ransom.BTCWare.F11B680C
  • Trojan-Ransom.FileCoder
  • Trojan.Win32.Z.Ransom.224768
  • Trojan[Ransom]/Win32.AGeneric
  • Uds.Dangerousobject.Multi!c
  • Win32.Trojan.Gen.Lkxl
  • Win32.Trojan.WisdomEyes.16070401.9500.9995
  • a variant of Win32/Filecoder.NPL
  • malicious_confidence_90% (W)

Analysis Report

General information

Family Name: Trojan.MSIL.Heracles.CZ
Signature status: No Signature

Known Samples

MD5: e00744dcc65e825d5385a507cee79b28
SHA1: 9d7579140b328345a5b5edec06a938513039db23
SHA256: A0E93E74BC3AD59391CF6C9D77540EF3B65733F4CD106BCA3A8AC25749E98F8E
File Size: 120.32 KB, 120320 bytes
MD5: 587201973c9a47bf1ac9b8f7c8ca48be
SHA1: 1dd21efa98468b056ed3e39bfffbc1a307aa6809
SHA256: 5F7AA8BE98A5E4A43E8C2178326823BB135FBCC12D452B9ABC8B44F3D22382E7
File Size: 162.30 KB, 162304 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Assembly Version 1.0.0.3
File Description Codominants Stenotypists
File Version 1.0.0.3
Internal Name
  • Truth.exe
  • Warning.exe
Legal Copyright Copyright © 2023
Original Filename
  • Truth.exe
  • Warning.exe
Product Name Transferrin Hermitry
Product Version 1.0.0.3

File Traits

  • .NET
  • CreateThread
  • HighEntropy
  • x86

Block Information

Total Blocks: 6
Potentially Malicious Blocks: 3
Whitelisted Blocks: 3
Unknown Blocks: 0

Visual Map

x 0 x 0 x 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Heracles.CZ

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Thread Create Remote
  • CreateRemoteThread
Process Manipulation Evasion
  • NtUnmapViewOfSection

Trending

Most Viewed

Loading...