The .mars ransomware is a new strain of the Major virus family which was just identified in an ongoing attack campaign. There is no information about the hacker collective behind it which gives us reasons to believe that the most popular delivery tactics are probably going to be used. A main technique remains the coordination of phishing email messages — they are designed to imitate well-known services and companies and their notifications. Through them various malware contents and attachments will be pushed to the intended targets.
A similar technique is the creation of malware sites that are hosted on domains that sound similar to well-known sites like search engines and download portals. They can be modeled to contain similar contents and design, as well as security certificates in order to make them appear as more legitimate.
The ransomware code can be inserted in various payload carriers including application installers and malicious documents. When they are opened by the victims or interacted the associate infection will begin.
In certain situations the infections can also be made through the inserting of the relevant code in browser hijackers — dangerous browser plugins which are made compatible with he most popular web browsers. They are uploaded to the relevant repositories using fake user reviews and developer credentials. Their descriptions usually post alluring additions or performance enhancements.
Other similar virus threats will start a sequence of several malware components that are controlled by the main engine. A typical infection will probably begin with a data harvesting module which will retrieve sensitive information both about the infected machines and the victim users themselves. This can help generate an unique infection ID that is to be assigned to every compromised machine. The personal information on the other hand is used for crimes such as financial abuse and identity theft.
The .mars ransomware can also use the acquired information in order to scan the system for the presence of any security software which will be bypassed. The list includes any anti-virus engines, firewalls, sandbox environments and virtual machine hosts. Their real-time engines can be bypassed or the apps will altogether be removed.
As soon as an intrusion is made various system settings will take place, some of the most common ones include the following:
- Boot Changes — The engine can program itself to automatically launch as soon as the computer is booted. This can also lead to a modification in the settings of the system which will render the recovery options non-working thus making the manual user removal guides useless. In this case only the use of a professional-grade anti-malware utility can remedy the infection.
- Windows Registry Modifications — Advanced ransomware infections can also include a built-in sequence that can modify existing values found within the Windows Registry or create ones that are related to the virus itself. This will usually lead to serious performance issues, data loss and unexpected errors.
- Additional Malware Delivery — The made infections can be used to deliver other threats to the compromised machines such as Trojans and miners. This is often coupled with removal of sensitive information from the systems — restore points and backups.
When all components have finished running the associated encryption engine will be called. Using a strong cipher the target user data is to be processed with it, usually a built-in list of target file type extensions is used. It will contain a list of popular user data such as the following: backups, databases, images, videos, music and etc. When this process is complete the .mars extension will be applied. The ransomware note that is crafted is made in a file called READ_ME.mars.
|Short Description||The ransomware encrypts files on your computer machine and demands a ransom to be paid to allegedly restore them.|
|Symptoms||The ransomware will blackmail the victims to pay them a decryption fee. Sensitive user data may be encrypted by the ransomware code.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by .mars Ransomware |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .mars Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.mars Ransomware – What Does It Do?
.mars Ransomware could spread its infection in various ways. A payload dropper which initiates the malicious script for this ransomware is being spread around the Internet. .mars Ransomware might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Read the tips for ransomware prevention from our forum.
.mars Ransomware is a cryptovirus that encrypts your files and shows a window with instructions on your computer screen. The extortionists want you to pay a ransom for the alleged restoration of your files. The main engine could make entries in the Windows Registry to achieve persistence, and interfere with processes in Windows.
The .mars Ransomware is a crypto virus programmed to encrypt user data. As soon as all modules have finished running in their prescribed order the lockscreen will launch an application frame which will prevent the users from interacting with their computers. It will display the ransomware note to the victims.
You should NOT under any circumstances pay any ransom sum. Your files may not get recovered, and nobody could give you a guarantee for that.
The .mars Ransomware cryptovirus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:
→vssadmin.exe delete shadows /all /Quiet
If your computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore your files back to normal.
Remove .mars Ransomware
If your computer system got infected with the .mars Files ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.