WininiCrypt Ransomware

WininiCrypt Ransomware Description

Type: Ransomware

The WininiCrypt Ransomware is an encryption ransomware Trojan. The WininiCrypt Ransomware is mainly being distributed through the use of spam email attachments. The WininiCrypt Ransomware was first observed in the wild on August 10, 2017. The WininiCrypt Ransomware is programmed using the Microsoft .NET Framework. This allows the WininiCrypt Ransomware to be delivered in a package smaller than usual and to avoid certain detection tools by commonly used anti-virus programs. The WininiCrypt Ransomware is being used to attack both individual computer users and small business networks and servers. There is very little to differentiate the WininiCrypt Ransomware from the countless other encryption ransomware Trojans that are active currently. However, the WininiCrypt Ransomware does not seem to be based on any specific ransomware Trojan's code or to belong to a large threat family.

Windows Users should be Aware of the WininiCrypt Ransomware

Due to its use of .NET Framework, the WininiCrypt Ransomware is especially effective in attacking the latest versions of the Windows operating system. In its attack, the WininiCrypt Ransomware will scan the victim's computer for certain file types associated with commonly used software, including Microsoft Office, media players, etc. the WininiCrypt Ransomware will use the AES encryption to make the victim's files unreachable, connecting with its Command and Control server to relay the decryption key, encrypt it using additional encryption, and make the victim's files inaccessible. The WininiCrypt Ransomware's Command and Control server, unlike many other ransomware Trojans, is not hosted on the Dark Web. The files encrypted by the WininiCrypt Ransomware will be marked with the addition of the file extension '.[cho.dambler@yandex.com],' added to the end of each affected file. The email address included in this file extension is the one used by the con artists to contact the victims and demand a ransom payment.

How the WininiCrypt Ransomware Tries to Extort Its Victims

The WininiCrypt Ransomware will drop a ransom note named 'HOW_TO_BACK_FILES.html,' which is displayed by the victim's default web browser after encrypting the victim's files. This HTML file contains the following text:

'All your files have been encrypted!
Your personal ID [RANDOM CHARCTERS]
All your files have been encrypted due to a security problem with your PC.
If you want to restore them, write us to the e-mail: cho.dambler@yandex.com
How to obtain Bitcoins
• The easiest way to by bitcoins is LocalBitcoins site. You have to register, click By bitcoins', and select the seller by payment method and price.
• hxxps://localbitcoins.com/buv bitcoins
• Also you can find other places to buy Bitcoins and beginners guide here:
• hxxp://mvw.coindesk.com/information/how-on-i-buv-bitcoins/
Free decryption as guarantee • Before paying you can send to us up to 1 No for No decryption.Please note that NO must NOT contain valuable information and their total size must be lot than 5Mb
Attention!
• Do not rename encrypted files. • Do not try to decrypt your data using third party software, it may cause permanent data loss.
• Decryption of your No with the help of third pates may cause increased price (they add their fee to our) or you can become a victim of a scam.'

PC security researchers counsel computer users to abstain from following the instructions in the WininiCrypt Ransomware's ransom note, despite that it is not possible to decrypt files that are compromised by the WininiCrypt Ransomware attack currently. Paying the WininiCrypt Ransomware ransom will rarely result in the return of the affected files and allows the people behind this attack to continue developing and creating threats like the WininiCrypt Ransomware in the future. Having file backups on independent devices or the cloud is the best protection against ransomware Trojans like the WininiCrypt Ransomware. File backups undo the WininiCrypt Ransomware attack completely since it removes the con artists' power to demand a ransom payment from the victim. Combining file backups with an anti-malware program should be enough to protect you from the WininiCrypt Ransomware and other ransomware.

Technical Information

Screenshots & Other Imagery

SpyHunter Detects & Remove WininiCrypt Ransomware

File System Details

WininiCrypt Ransomware creates the following file(s):
# File Name MD5 Detection Count
1 ba15c27f26265f4b063b65654e9d7c248d0d651919fafb68cb4765d1e057f93f.exe 3b200c8173a92c94441cb062d38012f6 3
2 yxugwjud.exe 16bcc3b7f32c41e7c7222bf37fe39fe6 2

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.