.honor Files Ransomware Virus - How to Remove It and Restore Data
THREAT REMOVAL

.honor Files Ransomware Virus – How to Remove It and Restore Data

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by .honor Ransomware and other threats.
Threats such as .honor Ransomware may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article aims to help you by showing you how to remove the .honor files virus (“honor’s ransomware”) from your computer and how to restore files, encrypted by it.

New ransomware infection, dubbed “honor’s ransomware” has been reported by security analyst GrujaRS to infect the computers of victims and then encrypt their documents, music, pictures plus other important files in order to hold them hostage until a ransom has been paid in BitCoin. The malware has also been reported to completely rename the encrypted files and then leave behind .honor extension plus instructions on how to get them back. So far, researchers have managed to establish that the code of this virus is based on the open-source virus, called “My Little Ransomware”, which was uploaded two years ago on GitHub.If your computer has been infected by the .honor files virus, we strongly suggest that you read the following article in order to learn more about this ransomware cryptovirus and how to remove it from your computer plus how to try and restore .honor encrypted files without paying cyber-crooks.

Threat Summary

Name.honor Ransomware
TypeRansomware, Cryptovirus
Short DescriptionEncrypts the files on the infected computer, using a combination with RSA and AES encryption algorithms, which generates unique decryption keys and asymmetric key.
SymptomsFiles are renamed with symbols, letters and numbers and have the .honor file extension added in the end.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .honor Ransomware

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .honor Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.honor Files Virus – Infection Methods

The primary method of propagation of this malware is conducted via e-mail spam messages. Such are often created with the aim to spread various different types of malicious e-mail attachments, which only pretend to be legitimate in order to get victims to open them. Such e-mails often have convincing statements within them, that aim to get victims to trust the message and open the attachment. Here is an example of how such e-mail may appear like:

In addition to via e-mail, the virus may also infect your computer via other methods, like upload a file on malicious websites.

.honor Files Virus – More Informaton

Once the .honor file extension ransomware has infected your computer, the virus may perform series of unwanted activities which end witht the malware encrypting the important files on victims’ computers. The .honor files virus may firstly connect to a remote command and control server and from it download it’s malicious payload files, which may reside in the following Windows directories:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%

The primary malicious file which was detected in association with the Honor ransomware infection has been reported to have the following parameters in the site VirusTotal:

SHA-256: e3ba5cad3da4c50412cd2bc2cfaa5332cf2578a913b14d81cafc1465a12e301b
Name: honor’s malware.exe
Size: 15 KB

In addition to this, file encryption has been reported to perform various different types of activities on the computer of the victim. The malware may schedule system tasks to run automatically on system boot and may also modify the run and runonce sub-keys by adding value strings with the files it may run automatically on system startup, such as the .exe file, that has been reported to cause the encryption. The sub-keys have the following locations:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

In addition to modifying the Windows Registry sub-keys, the malware may also perform other activities on your computer, such as have your backups and shadow copies deleted via the vssadmin and bcedit commands. These may be ran automatically after the virus overrides Windows defenses and assumes administrative privileges. The commands are as follows and they may be ran via a script file:

→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

The deleted shadow copy files and backup types of files by the .honor ransomware may be of the following file types:

→ .VHD .bac .bak .wbcat .bkf ,backup, .set, .win .dsk

In addition to deleting the backups, the .honor files virus may also perform other unwanted activities, such as launch it’s encryption activities, which result in several other files which are then generated, like the AES keys and the unique identifier.

.honor Files Virus – Encryption Process

When this ransomware virus has been detected by malware researchers, it was reported to use the AES encryption algorithm, but in what mode and strenght, it is so far unclear. The cyper generates a unqiue assymetric decryption key, which is saved alongside a secret key which is most likely RSA encrypted and also a unique identifier. This information is likely to be sent to the cyber-crooks and it is summed up in four different types of files, named:

  • data recive
  • Secret.txt
  • secretAES.txt
  • sendBack.txt

The .honor files virus targets specific types of files for it’s encryption process, such as documents, audio and video files, pictures, archives and other types of files. The virus may target files with the following file extensions:

→ “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”

After the encryption is complete, the files are completely renamed with symbols, letters and numbers and have the .honor extension added as their suffix. They may appear like the image below displays:

Remove Honor Ransomware and Restore .honor Files

In order to fully remove this ransomware infection from your computer, recommendations are to focus on follow the removal instructions underneath this article. They have been created so that you can remove Honor ransomware either manually or automatically. If you lack the experience in malware removal, we strongly suggest that you focus on removing this infection automatically by downloading an advanced anti-malware software, as experts suggest. Such software will help you to automatically remove all malware, including .honor ransomware and ensure that your computer is protected against future infections as well.

If you want to restore files that have been encrypted by this ransomware virus, we would suggest that you focus on following the alternative methods for file recovery down below in step “2. Restore files encrypted by .honor Virus”. They have been created with no guarantee that you will be able to recover all of your encrypted files, but with their aid, you might be able to recover some of your data at least.

Note! Your computer system may be affected by .honor Ransomware and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as .honor Ransomware.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove .honor Ransomware follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove .honor Ransomware files and objects
2. Find files created by .honor Ransomware on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by .honor Ransomware

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...