FileFrozr Ransomware (RaaS) – Remove and Restore Your Files

This article will aid you to remove FileFrozr ransomware effectively. Follow the ransomware removal instructions at the bottom of the article.

FileFrozr ransomware is a RaaS (Ransomware as a Service) that is being offered for the price of 0.09 Bitcoins or 100 US dollars. The service offers a discount and will receive an update soon, so live versions could begin to spread fast. If you get infected, your files will become encrypted and receive an extension, which the buyer has set. Files with around 250 different extensions will get encrypted. Read the article through and see what ways you can try out to potentially restore some of your data.

Threat Summary

NameFileFrozr
TypeRansomware, RaaS, Cryptovirus
Short DescriptionThe ransomware is put on the Internet as a service (RaaS). It is offered for 0.09 Bitcoin or 100 US dollars.
SymptomsThe ransomware will encrypt your files and will place an extension to all files after the encryption is completed.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by FileFrozr

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss FileFrozr.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

FileFrozr Ransomware – Delivery Methods

The FileFrozr ransomware could be delivered via many different methods. Since it is a ransomware as a service, whoever makes a variant of it could choose to spread it with more than one method. One of the many possibilities is through document files, as the coders for the cryptovirus can put a script code for enabling macros inside them as a way of infection. Another option for delivering it to the end user could involve the spread of the payload dropper by using Exploit Kits or attaching it in spam e-mails. Also, it is good to take note of the advertising that the creator of FileFrozr is doing on numerous sites, such as sinister.ly:

The text states the following:

FILE FROZR is a great security tool that encrypts most of your files in several minutes.
Fast, stable, and affordable crypto-locker.
Auto-buy, low price, undetectable load while working, TOR support, 250+ extensions, unmatched support, multithreaded, online builder, server side obfuscation. Bypass BitDefender and Malwarebytes Anti-Ransomware.
Encrypts user data using safe implemented AES-256 and RSA-4096, each file encrypts with it own unique key.
50$ Discount on sales start!

The FileFrozr ransomware could also get delivered through social media networks and file-sharing services. Freeware programs found on the Web could be promoted as useful but still contain the downloader for the payload of the ransomware. Don’t open files when you download them, before scanning them with a security tool beforehand. That goes especially for files, which come from a suspicious source, like an e-mail with an unknown origin. You should check their size and signatures for anything that seems unusual, as well. Also, give the ransomware prevention tips a read to see how you can avoid future infections.

FileFrozr Ransomware – Technical Details

FileFrozr ransomware is a cryptovirus that is being distributed on the Internet as a RaaS (Ransomware as a Service). The following TOR web pages are being used to sell it:

  • http://frozrlockqqxz7a2.onion
  • http://frozrlockqqxz7a2.tor2web.cf
  • http://frozrlockqqxz7a2.onion2web.gq
  • http://frozrlockqqxz7a2.onion2web.tk
  • http://frozrlockqqxz7a2.onion.link

Visiting the site through any of those links will load its main screen. This is how the main page of the FileFrozr service looks like once you are on its website page:

The text on the TOR-based website reads:

FILE FROZR is a great security tool that encrypts most of your files in several minutes.
First month discount -50$! Until 31.03.2017

Coded from scratch

FILE FROZR is coded from startch in C#, no public sources were used. This makes FILE FROZR fully undetectable. Tested with Bitdefender Anti-Ransomware and MalwareBytes Antiransomeware. All builds are obfuscated at our servers. This prevrents original sources from being detected.

Affordable and ready to use “Out of the box”

Unlimited rebuilds, low price, panel with built in payment processor, AES256, RSA4096, and unique keys randomly generated for each file guaranting super strong security of files. Builds are obfuscated and crypted at our servers, no aditional crypting etc. required.

No need of vps

Panel using trusted Bitcoin processor so there is no need to set vps with BitcoinID. TOR support and low value of transfering data makes panel totally anonymous.

You can preview the default ransom note implemented in the ransomware from here:

This is what that ransom note states:

Buy FROZRLOCK “MasterKey”
In order to proceed, please send 0.50000 to: 14onCfK8KiCm5UMRtEqhJYucHPg8XSGeRc
You have 48 hours to make your payment. Do not close the program, do not turn your PC off unless you want to lose your data. Reload this page after the payment has been done. It may take from 15 minutes to 3 hours to confirm the BTC payment. Take your time! You will see a different BTC wallet address every time you refresh the page until the transaction has been confirmed. You do not need to pay twice. Just reload the page a bit later until you finally get your MasterKey. You may use any device to open this page for all data is stored remotely. When you download your MasterKey to the encrypted device the decryption process will start automatically. Decryption may take a few hours. Just wait patiently until you see the corresponding notification on your screen. GOOD LUCK
You can scan QR code for easy payment

The FileFrozr ransomware virus uses BitCoin and the TOR service for keeping its creator anonymous and hidden on the Web.

FileFrozr Ransomware – Encryption Process

The FileFrozr ransomware cryptovirus searches to encrypt files with more than 250 different extensions. More file extensions are quite possible to be added, depending on what files, cybercriminals wish to encrypt. The encryption process uses the AES encryption algorithm with 256-bit ciphers and RSA with 4096-bit ones. In a pending update, the cryptovirus will have a feature for offline mode, meaning that internet connection won’t be required for the malware to encrypt your data.

The FileFrozr cryptovirus might be set in the future to erase the Shadow Volume Copies from the Windows operating system by using this command:

→vssadmin.exe delete shadows /all /Quiet

Read on through and see what types of ways you can try to potentially recover some of your data.

Remove FileFrozr Ransomware and Restore Your Files

If your computer got infected with the FileFrozr ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Manually delete FileFrozr from your computer

Note! Substantial notification about the FileFrozr threat: Manual removal of FileFrozr requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove FileFrozr files and objects
2. Find malicious files created by FileFrozr on your PC

Automatically remove FileFrozr by downloading an advanced anti-malware program

1. Remove FileFrozr with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by FileFrozr
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.