Threat Database Ransomware TorrentLocker Ransomware

TorrentLocker Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 803
First Seen: August 19, 2014
Last Seen: June 29, 2021
OS(es) Affected: Windows

As a new file encryptor Trojan that borrows its structure and aesthetics from previous, unrelated threats, the TorrentLocker Ransomware continues the overall theme of encrypting files on infected computers and then demanding illegal ransom fees to restore the affected files back to readability. Although the TorrentLocker Ransomware uses ransom messages that misidentify the TorrentLocker Rnmsomware as a variant of the CryptoLocker Virus deliberately, malware researchers have verified that the TorrentLocker Ransomware is unrelated to CryptoLocker (or similar PC threats) in terms of code. The same precautions in use against other ransomware also should be used to protect against the TorrentLocker Ransomware attacks, or remove the TorrentLocker Ransomware, if necessary.

The Trojan File Locker with Less Originality than Malice

The TorrentLocker Ransomware was identified being circulated in recent phishing attacks, which may use e-mail attachments or mislabeled Web links to compromise vulnerable computers. Major TorrentLocker Ransomware campaigns, so far, have targeted Australian residents through fake e-mail-based invoice documents. Relevant file attachments are executable files, or EXE files, but are mislabeled to look like another, harmless file type, such as a text document. 'Parcel_information.exe' is one example of a file name used by the TorrentLocker Ransomware for its installation.

Like past ransomware families, the TorrentLocker Ransomware encrypts the files on your PC (using a relatively simple, Rijindael-based algorithm) to make them unreadable. The TorrentLocker Ransomware then displays ransom messages that resemble those of other, thoroughly-identified file lockers intentionally: CryptoLocker and CryptoWall Ransomware. However, malware experts have verified that the TorrentLocker Ransomware uses a weaker form of encryption than either of these two families, and is unrelated to them – except for superficially resembling them in its warning messages.

The TorrentLocker Ransomware does share a vulnerability in common with CryptoLocker and is unable to implement its file-encrypting attacks without first contacting its Command & Control server. Similarly, PCs that are compromised by the TorrentLocker Ransomware but lack Internet access also will be unaffected by current versions of the TorrentLocker Ransomware and its attacks. However, vulnerable machines, documents, audio files, images and other data could be encrypted and rendered potentially irretrievable.

Fighting Back Against the Torrent of File Lockers

Since the TorrentLocker Ransomware lacks major features besides copying the external details of other, more professionally-designed threat than itself, the TorrentLocker Ransomware currently is estimated to be unlikely to see the same in-depth development as other file encryptor Trojans. However, for victims who are affected, the TorrentLocker Ransomware may damage a wide range of files on your hard drive and may mislead some victims into paying its BitCoin ransom for file recovery. The TorrentLocker Ransomware also injects its primary file component into Explorer.exe, which is a normal Windows component, thus complicating identification or removal of the infection.

File types known to be targeted by the TorrentLocker Ransomware include documents like DOCX, XML spreadsheets, JPEG pictures and a range of other, specialized files, such as database files for SQLite software. Until the TorrentLocker Ransomware's servers are taken down by authorities, and its campaign brought to a halt, malware researchers encourage disconnecting infected PCs from the Internet and using anti-malware tools for deleting the TorrentLocker Ransomware (which, by default, will launch two separate copies of itself).

Instead of utilizing the TorrentLocker Ransomware's recommended BitCoin ransom to restore affected files, you should restore any files from a remote, uninfected backup. Due to the weakness of the TorrentLocker Ransomware's chosen encryption method relative to CryptoWall or CryptoLocker, it may only be a matter of time before third party tools for reversing the TorrentLocker Ransomware's attacks also become available to the public.

SpyHunter Detects & Remove TorrentLocker Ransomware

File System Details

TorrentLocker Ransomware may create the following file(s):
# File Name MD5 Detections
1. lsassw86s.exe 2a3677209976516d5925140e56d2b3fc 50
2. lsassw86s.exe bad2a98576d366faeb5285b0d40fad3c 40
3. lsassw86s.exe dddb0f61a2464e5dd086d331edef9ed7 29
4. lsassw86s.exe 24cba908a0c694b3f7b01f9e06834dfb 23
5. lsassw86s.exe c6cdf1ab343efcc37a3e617edb741017 23
6. lsassw86s.exe e507ad76527cd063c12798a1d6169837 15
7. lsassw86s.exe 33a2ac19e8c6c2ba26e9cab5b2d2b42c 15
8. lsassw86s.exe ba4687e7af60c53bcc65bff2e2b65293 14
9. lsassw86s.exe 6c439da60aba9c17132e7676173689ee 14
10. lsassw86s.exe eba596e4d56211596bcd711e2f877e60 11
11. lsassw86s.exe d85620cae65e8f0e994afcb79c7b0178 9
12. lsassw86s.exe 6f766b8e7b67e7118b55972a3b9c5f72 8
13. lsassw86s.exe 03bc5a3cf6221b57e22977abfc4a2978 8
14. lsassw86s.exe 6548ae9209723c67276629d30cc676d0 8
15. lsassw86s.exe cd88c44effa80d1eacefdd357934d9c7 7
16. lsassw86s.exe 33e6a5d26d9a427d270f0f0251dc3dce 6
17. lsassw86s.exe ffe0bbe76e85a0285c1b0872911efaeb 6
18. lsassw86s.exe 2b9ac3b518a724549b1870d994b4338c 6
19. lsassw86s.exe be8174c65aa8b6ee80719bf64fd10de6 5
20. lsassw86s.exe e88b66496a794889c09d2917c185049b 4
21. lsassw86s.exe 9794f91db5e133e1071b9b93fae10bcc 4
22. lsassw86s.exe f265b5d9e0060a3203dbd2489f8c2b56 4
23. lsassw86s.exe 59b03095693ccf1ba32b3908d57c2ae6 4
24. lsassw86s.exe ae6c0969b3925f3f6de0f05b20b29244 4
25. lsassw86s.exe cb47181ccb0825195672c726e2487893 3
26. lsassw86s.exe 5848056b3093a661c3efdd8c5e22bd7a 3
27. lsassw86s.exe c899164239f9d84be9035716a2435767 3
More files

Registry Details

TorrentLocker Ransomware may create the following registry entry or registry entries:
Regexp file mask
%WINDIR%\system32\lsassw86s.exe
%WINDIR%\SysWOW64\lsassw86s.exe

Related Posts

Trending

Most Viewed

Loading...