SecneurX Threat Analysis
What is Andrianov Ransomware ?
SecneurX Analysts found the Andrianov Ransomware in the wild and analysed the sample. This ransomware exhibits several similarities and overlaps with Chaos Ransomware. Chaos is a customisable ransomware builder that emerged in underground forums by falsely marketing itself as the .NET version of Ryuk despite sharing no such overlaps with the notorious counterpart. The fact that it’s offered for sale also means that any malicious actor can purchase the builder and develop their own ransomware strains, turning it into a potent threat.
Andrianov Ransomware encrypts files and appends its extension (".1iyT6bav7VyWM5") to filenames. Also, it drops the "andrianov.txt" file that contains a ransom note. After executing the Andrianov ransomware all files and folders got encrypted and appended their filenames with a ".1iyT6bav7VyWM5" extension. For Example a file titled as "Sep2019.docx" appeared as "Sep2019.docx.1iyT6bav7VyWM5", "Jan2020.docx" as "Jan2020.docx.1iyT6bav7VyWM5", and so on. "Use the IoCs outlined in this report to monitor for a Chaos infection, as well as connections to any suspicious infrastructure," the analysts recommended.
Screenshot of files encrypted by Andrianov ransomware
Andrianov Ransomware Overview
Andrianov ransomware notes informs the victim that all files and folders have been encrypted and also informs the victim to pay 200$ value of bitcoin to their wallet address and also mentions an email address (“email@example.com”) in ransomware note.
How does ransomware infect my computer?
Screenshot of Andrianov Ransomware Text file (“andrianov.txt”)
Ransomware Note (andrianov.txt) in Text
Your Personal Files has been Encrypted and Locked
Your documents, photos, databases and other important files have been encrypted with strongest encryption and locked with unique key, generated for this computer.
Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key.
Caution: Removing of Blackhat will not restore access to your encrypted files.
Frequently Asked Questions
What happened to my files ? understanding the issue
How can i get my files back ? the only way to restore your files
What should i do next ? Buy decryption key
Now you have the last chance to decrypt your files.
1. Buy Bitcoin (https://blockchain.info)
2. Send amount of 200 dollar to address
3. Transaction will take about 15-30 minutes to confirm.
4. When transaction is confirmed, send email to us at firstname.lastname@example.org
Click here to restore and recovery your files
What can you do to avoid being a ransomware victim?
As dangerous as ransomware is, simply being aware and staying updated with the latest ransomware trends can go a long way in securing your data and systems. Here are helpful tips on how you can defend yourself from a likely attack.
Scrutinize emails & its attachments before opening them
Be wary of emails from unverified sources. You can check by communicating directly with the purported sender to confirm if they sent the messages. To check its validity, you can use SecneurX Sandbox to verify the sanity of the email.
Avoid clicking embedded links found in unverified emails
Such social engineering tricks can lead to the download of ransomware. Additionally, be wary of sites that prompt you to enter a CAPTCHA code as this could be linked to a ransomware attack. To check its validity, you can use services like SecneurX Sandbox to verify the reputation of the site.
Back up your important files
While prevention is always better than the cure, having a backup of important files can at least lessen the potential damage done by a ransomware attack. While being locked out of your own system is always a bad thing, at least it's not a total disaster since you can always retrieve your important files. The 3-2-1 backup rule applies here—three backup copies of your data on two different media, and one of those copies in a separate location.
Regularly update software, programs, applications
Updating them to the latest versions can provide an added layer of protection against online threats as some ransomware arrive via vulnerability exploits.
Use a layered protection suite