Home Malware Programs Ransomware BadRabbit Ransomware

BadRabbit Ransomware

Posted: October 25, 2017

Threat Metric

Ranking: 12,494
Threat Level: 10/10
Infected PCs: 148
First Seen: October 25, 2017
Last Seen: October 3, 2023
OS(es) Affected: Windows


The BadRabbit Ransomware is a family of file-locking Trojans that can damage media by encrypting it, collect passwords to gain improved access to vulnerable systems, and display screen-locking ransom notes. Threat actors are installing the BadRabbit Ransomware with fake Flash updates that they may circulate on corrupted websites or through other means, such as spam e-mails. Users should protect their files by having anti-malware products capable of deleting the BadRabbit Ransomware on sight and maintaining adequate backup safeguards.

Trojan Bunnies Hopping Borders

The age of threat actors avoiding attacking Russian targets has long since passed, and the newfound vulnerability of the nation is, perhaps, best showcased with the BadRabbit Ransomware campaign. This series of attacks is similar to those of the '.wcry File Extension' Ransomware family structurally, although the BadRabbit Ransomware isn't a direct relative. Attacks that malware experts can confirm are for more than just Russian entities, but also Ukrainian subway systems, South Korea, Europe, and the United States.

The group of threat actors organizing the BadRabbit Ransomware's campaign distribute their threat as a fake patch for the Adobe's Flash, which is most likely installing through website exploit kits or e-mail-based vulnerabilities. The BadRabbit Ransomware uses a secure encoding method leveraging a combination of the AES and RSA ciphers to block the infected system's media, which includes documents, pictures, spreadsheets and archives. The enciphering routine also adds an extra, internal 'encrypted' marker to each file, in addition to the traditional practice of appending a new extension ('.encrypted').

When it completes its file-locking routine, the BadRabbit Ransomware restarts the computer and forces it to load a screen-locking startup screen that bypasses Windows. This screen gives the user a link to the threat actor's TOR website, for paying a ransom to purchase the BadRabbit Ransomware's decryption code. Although malware experts are noting that the BadRabbit Ransomware's initial ransom fee is unusually cheap at 0.05 Bitcoins, the website does include a time limit before raising it.

Snaring a Pest before It Snatches Your Files

With less than three hundred dollars required for paying, victims are likely to be tempted into submitting to the BadRabbit Ransomware's ransoming demands. However, the Trojan's insistence on Bitcoins always leaves open the chance that threat actors will accept their money without giving any decryption assistance back to the user. Another security risk malware experts point out as significant is the BadRabbit Ransomware's modular use of the Mimikatz app, which could help the crooks to collect login combinations and passwords to compromise new targets, especially locally networked ones.

The BadRabbit Ransomware's threat actors are highly active in distributing their threat to different targets, including Russian news agencies and other, for-profit business sectors. Besides the standard precautions, such as backing up your media, recommended defenses against the BadRabbit Ransomware include disabling the Windows WMI service temporarily if it's practical. With the decryption of any files that this threat locks being unlikely, all users should emphasize security practices that help them block and remove the BadRabbit Ransomware with anti-malware programs before its attack routine finishes.

The BadRabbit Ransomware campaign is relatively sophisticated and makes practical use of default Windows features for installing itself and conducting attacks afterward. With so many companies around the world already harmed by its activities, all PC workers with Internet access should be on guard for exploits that could let this Trojan hop into their networks.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 142.85 KB (142855 bytes)
MD5: 7b5b089320d83de636b9befa84c47c3e
Detection count: 65
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 29, 2017
%SYSTEMDRIVE%\Users\<username>\Downloads\Nueva carpeta\MalwareDatabase-master\ransomwares\Endermanch@BadRabbit.exe File name: Endermanch@BadRabbit.exe
Size: 441.89 KB (441899 bytes)
MD5: fbbdc39af1139aebba4da004475e8839
Detection count: 61
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\<username>\Downloads\Nueva carpeta\MalwareDatabase-master\ransomwares\Endermanch@BadRabbit.exe
Group: Malware file
Last Updated: October 3, 2023
file.exe File name: file.exe
Size: 441.89 KB (441899 bytes)
MD5: 3cb5717501a26fc7b110c5e5c95865ae
Detection count: 6
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 26, 2017
file.exe File name: file.exe
Size: 441.89 KB (441898 bytes)
MD5: 34c8ca24bace33c90459364ae8cfebd2
Detection count: 3
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 26, 2017
file.exe File name: file.exe
Size: 419.4 KB (419401 bytes)
MD5: fa1f941b8fb0492f33d6902f02d55b97
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 26, 2017
Loading...