NinjaLoc virus is a test ransomware that appears to be made by its creators. The current attack campaign uses infected software installers to spread itself. Our article provides an overview of the virus operations and it also may be helpful in attempting to remove the virus.
|Short Description||The ransomware encrypts sensitive information on your computer system and demands a ransom to be paid to allegedly recover them.|
|Symptoms||The ransomware will encrypt your files with a strong encryption algorithm.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by NinjaLoc virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss NinjaLoc virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
NinjaLoc Virus – Distribution Ways
The NinjaLoc virus is a new ransomware threat which is being actively spread using a variety of different tactics. The captured samples are low in quantity which shows that ongoing campaign is a test release.
One of the reports indicate that the NinjaLoc virus is spread as a fixitup.exe file leading us to believe that the main method is the payload creation. The hackers are embedding the virus code into application installers of system utilities which are being spread using various tactics.
A main method is the use of phishing SPAM messages that appear as being sent by a legitimate company or service. They use familiar design elements and are disguised as password reset prompts, software updates or other messages that the user might regularly receive.
The criminals can also construct malicious download sites which are fake portals and vendor sites. They use the same design and elements as the legitimate ones, advanced versions can push various pop-ups and redirects to further coerce the victims into interacting with the malicious elements.
The other type of malicious payload that may be used for spreading the NinjaLoc virus is the use of infected documents: spreadsheets, rich text documents, presentations and databases. Once they are opened by the victim users a notification prompt will ask the users to enable the built-in macros. Once this is done the infection will follow.
Dangerous scripts can also be used to spread the ransomware — all types of banners, pop-ups, redirects and hyperlinks that can be found both on hacker-controlled pages and legitimate sites such as community forums.
Advanced infections may utilize browser hijackers to spread the NinjaLoc virus. They are malicious plugins made for the most popular web browsers and can be typically acquired from the associated extension repository. They are uploaded with fake user reviews, developer credentials and promises of adding new functionality that is not available standard on them. Once they are installed the users will be redirected to a hacker-controlled site by manipulating the built-in settings (default home page, new tabs page and search engine). The next step is the deployment of the threat.
NinjaLoc Virus – In-Depth Analysis
The security analysis of the NinjaLoc virus shows that this is a newly created ransomware threat that does not feature code from any of the famous malware families. There are several possible theories about its origins:
- Custom Creation — The most likely source of the ransomware is its creation by the hackers who are distributing it. They have programmed it by themselves to follow a set execution pattern.
- Custom Order — Most hacker underground markets offer custom solutions for a certain fee. The operators that are distributing it are not the same collective behind its creation.
Depending on the set instructions of the captured virus samples different actions can be executed. A typical ransomware infection will begin with a data harvesting module. It is used to gather information about victims allowing the criminals to expose their identity. The malicious engine is configured to automatically retrieve private information including the following: names, address, phone number, interests, location and any stored account credentials. Other data that can be collected includes campaign metrics which are useful for the hackers in planning their next attacks. Such information includes installed hardware components, user-set settings and certain operating system values.
The collected data can be processed by another component called stealth protection. It scans the local system for applications or services that can interfere with the proper virus execution — anti-virus products, sandbox environments or virtual machine hosts. Their respective real-time engines can be disabled or completely removed.
The main module can then proceed with system modifications that can include different actions. A popular technique is the manipulation of the Windows Registry. When entries belonging to the operating system are modified the users will experience significant performance issues. Modifications to user-installed apps or services will result in the inability to start certain functions.
If the NinjaLoc virus is installed as a persistent infection. This means that the malware will be started automatically once the the computer is powered on, furthermore it will stop certain services from starting properly. In many cases this also leads to the inability to enter into the boot recovery menu.
The hackers can also instruct the ransomware to delete the backup data — both System Restore information and Shadow Volume Copies of identified user data. To effectively restore the affected files the victims will need to use a professional-grade backup solution.
Other dangerous changes to the infected machines include the start of a Trojan module. It establishes a connection with a hacker-controlled server which is used to spy on the victims in real time. Other actions includes the ability to remote control the machines, steal user files and deploy other threats.
NinjaLoc Virus — Encryption
Once all prior components have completed the ransomware module will be started. Like previous infections it uses a built-in list of target file type extensions. An example list can target the following data:
The captured samples of the NinjaLoc Virus inhibit both a lockscreen and a ransomware note (in a file called “HowtoDecryptYourfiles.txt”). The lockscreen dislays the following message:
Opps All of your files have been encrypted!
JUST ENCRYPTED YOUR FILES!
[What Happened to my files!] My Bitcoin Address
[1MxjjTN6hVJGJtVkLzPat1FCzb1YKdgaup] [Copy Address!] DON’T WASTE YOUR TIME ON INTERNET SEARCHING FOR SOLUTION NIGGA!
NOTE: IF YOU TRY TO REMOVE THIS RANSOMWARE YOU WILL LOSE YOUR ALL FILES INSTANTLY!
Enter Key To Decrypt!
[…] Start Decrypting!
Remove NinjaLoc Ransomware Virus and Restore Encrypted Files
If your computer got infected with the NinjaLoc ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.