Ransomware, named Moth, because it uses the file extension .m0th is the sole reason of users complaining in online forums. The ransomware uses an extremely strong AES-256 encryption algorithm to encipher the files of users, rendering them unusable and unable to be accessed via any software. More to it Moth ransomware leaves a ransom note which aims to scare users into paying the ransom. Security experts firmly believe that exactly the opposite of paying should be done – removing the virus and attempting to restore the files via any possible method besides this one. Unfortunately, direct decryption is not available at the moment, and this is why we advise you to read this article to delete Moth Ransomware and try to revert your files.
|Short Description||The ransomware encrypts files with the AES-256 cipher and asks a ransom for decryption.|
|Symptoms||Files are encrypted and become inaccessible. A ransom note with instructions for paying the ransom shows as a READMEPLEASE.TXT file.|
|Distribution Method||Spam Emails, Email Attachments, File Sharing Networks.|
|Detection Tool|| See If Your System Has Been Affected by Moth |
Malware Removal Tool
|User Experience||Join our forum to Discuss Moth Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Moth Ransomware – How Does It Spread
To be widespread, Moth Ransomware’s creators may have used a combination of several tools to assure successfully undetected infection to as many users as possible for them:
- Spam bots or spamming services.
- Program joiners.
- Crypters otherwise known as obfuscators.
- Malicious macros.
- Exploit Kits.
Such tools may be used to replicate spam e-mails under the pretext they come from a legitimate sender, like a well-respected company or other organizations and institutions. The e-mails may either contain malicious web links or other malicious files that may infect your computer.
Another possibility of infection which is less likely but still an option for crooks is to take advantage of a shady advertising platforms and programs, like ad-supported browser hijacking software which displays browser redirects on the user PC. One of those redirects may carry the malicious drive-by download script for Moth Ransomware.
Moth Ransomware – In-Depth Analysis
As soon as Moth Ransomware has been initiated on the user’s PC, it may create malicious files in several key Windows folders:
- %User’s Profile%
After it has created the malicious files, Moth Ransomware may also begin to modify Windows settings. The Moth virus may create registry values to run whenever the user boots up Windows:
To encrypt files, Moth Ransomware supports a scanning encryptor which may go through a wide variety of file extensions associated with videos, music, adio files, databases and other file types, for example:
After it detects the extensions it is preconfigured to encrypt Moth ransomware begins applying an AES-256 cipher on the files, generating a unique private key which is sent to the cyber-criminals’ C&C (Command and Control) center so that they can later ask BitCoins for them.
The encrypted files have the .m0th file extension, for example:
Furthermore, files encoded by Moth ransomware cannot be opened by any other software and fast and 100% direct decryption is only possible in case the user has obtained the private AES encryption key.
After encryption, Moth creates the READMEPLEASE.TXT file which contains the demands of the black hat hackers:
As visible from the ransom note above, it is almost identical to another ransomware variant, known under the nickname BitMessage suggesting that Moth ransomware may be a variant of BitMessage virus. This particular threat is known to take advantage of the anonymous messaging service BitMessage to communicate with the victims of the virus undetected and in the same time faster and easier. Clever move from the cyber-criminals since they realize that “customer support” is important as well.
Moth Ransomware – Conclusion, How to Remove It and Restore the Files
To summarize and conclude, Moth Ransomware appears to be a variant of BitMessage ransomware – It uses the same AES-256 cipher, leaves the same ransom note and maybe has, even more, similarities. This is a strong indicator that this virus may have been sold on the black markets as a service (RaaS Scheme) or the same gang behind it created another virus with improvements, although it is way less likely because there is no working decryptor for BitMessage as well.
To remove Moth ransomware, we advise you to carefully follow the removal steps at the bottom of this page. In case you are having difficulties or are not sure that the manual removal instructions will help you, we advise following the automatic removal solution and download an advanced anti-malware program. It will swiftly find all files associated with Moth ransomware, remove them and protect your computer in the future as well.
To try and gain back access to your files, we advise you to be very careful, since this virus may have a CBC mode, which essentially “breaks” the files you are trying to decrypt with another decrypter directly. This is why we advise avoiding direct decryption and trying some of the alternative methods in step “3.Restore files encrypted by Moth” below. They may not be fully effective, but they may also help you recover little portion of the data you lost.