Image Source: Ransowmare.it
Users on security forums and system administrators have complained about new “Parisher” ransomware that attacks primarily archives amongst other files it encrypts. The virus aims to render all files no longer usable by encrypting them after which use those files to extort the user to contact the e-mail of the hacker – [email protected] The virus drops a key file suggesting that this is the public key file used in notorious algorithms, such as RSA or AES ciphers. Not only this, but the virus drops it’s ransom note on encrypted servers in the form of weird 1NFORMATI1ONFOR.YOU file. Anyone who has been infected by Parisher Ransomware is strongly advised to immediately remove the virus and attempt alternative methods to restore the files such as the ones mentioned in this article.
|Short Description||The ransomware encrypts files with strong ciphers and asks a ransom for decryption.|
|Symptoms||Files are encrypted and become inaccessible. No extension is added. The virus may target primarily servers and their archives.|
|Distribution Method||Spam Emails, Email Attachments, File Sharing Networks.|
|Detection Tool|| See If Your System Has Been Affected by Parisher |
Malware Removal Tool
|User Experience||Join our forum to Discuss Crysis Ransomware.|
|Data Recovery Tool||Stellar Phoenix Data Recovery Regular Version Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Parisher Ransomware How Is It SpreadParisher Ransomware How Is It Spread
For Parisher ransomware virus to infect the maximum amount of users, the virus may utilize a sophisticated combination of tools and spreading methods. Believed to be a variant of the notorious Mobef ransomware, the Parisher virus is believed to be spread in two primary ways:
- Spam e-mail attachments being sent out to users and cause infection upon opening without being detected.
- URLs that are posted on social media and aim to cause redirects to malicious drive-by web links once they are opened.
Parisher Ransomware – More Information
As soon as this ransomware virus has infected users’ computer, it could start to create files that are malicious and conceal them via process obfuscators in different Windows folders. The files may be different file types:
→ .exe, .tmp, .dll, .cmd, .bat, .vbs
They may also be existing under different names, most commonly names resembling legitimate Windows programs such as “notepad.exe” or “svchost.exe”. The usually targeted folders for this are:
After having infected the user, Parisher may delete all of it’s shadow volume copies that create a file history via the vssadmin command:
After performing this, the Parisher virus may create a custom value string in the “Run” or “RunOnce” registry keys:
The objective of those value strings is to begin looking for several different file extensions, primarily associated with programs that are often used.
Once the virus has discovered those file extensions, it will begin to encode files. These files are then enciphered with the sole purpose to no longer be opened. Unlike Mobef Ransomware, on which this virus is most likely based on, the encrypted files by this virus are primarily archives, and they do not have any file extension appended to them.
After encryption, this ransomware drops a note on a file that is named “1NFORMAT1ONFOR.YOU”. The note has the following content:
Remove Parisher Ransomware and Restore Your Files
In case you are interested in removing Parisher completely from your computer, we have provided instructions below which will assist in the complete deletion of this virus. If you are inexperienced in doing so, it is strongly advisable to use an advanced anti-malware program that will ensure the successful removal of the virus from your computer.
Not only this, but Parisher ransomware’s files cannot be directly decrypted as well. This is why we have also suggested alternative file restoration methods which are not 100 percent guaranteed to succeed but could save you a great deal of time if you are successful. Also, make sure to perform a system backup before trying those methods.