Home Malware Programs Ransomware HAHAHA Ransomware

HAHAHA Ransomware

Posted: March 20, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 5
First Seen: March 20, 2017
Last Seen: November 28, 2019
OS(es) Affected: Windows

The HAHAHA Ransomware's author, apparently, is not among the most skilled or experienced cyber crooks since they've opted to use an open-source project as the foundation of their threatening product. The HAHAHA Ransomware is based on CryptoWire Ransomware, an open-source ransomware project that is meant to have an educational purpose but has already been misused to craft a crypto-threat that is able to cause a lot of damage to the files of its victims. The HAHAHA Ransomware is only the latest addition to the list of CryptoWire variants such as VapeLauncher and Lomix Ransomware. One of the peculiar things about the HAHAHA Ransomware is the distribution technique its author has opted to use. Instead of relying on the classic e-mail spam or taking advantage of a popular exploit kit, the HAHAHA Ransomware is spread as fake hacking tools such as Steam Cash or BTCHacker. Just like the operator of the Kirk Ransomware, the HAHAHA Ransomware's author also targets people in the hacking branch by spreading their ransomware as a fake hacking tool.

The HAHAHA Ransomware's author has not modified the CryptoWire's default window too much, and the only major change is seen in the field that stores the ransom message. The cyber crook behind the HAHAHA Ransomware demands $500 from victims and asks them to send a message to hugoran1@gmx.com when the payment has been completed. The message promises that all users whose payment has been verified will receive a decryption key that can be entered in the HAHAHA Ransomware's lock screen to restore the locked files. In addition to this, the HAHAHA Ransomware's message warns victims that their files would not be restored if they opt to close the window or run an anti-virus utility to eliminate the threat. There are two methods users can use to recognize the files that the HAHAHA Ransomware has locked – their names will be changed to include the '.encrypted' extension before the original file extension (e.g. 'picture.png' will be renamed to 'picture.encrypted.png') or they'll be listed in the HAHAHA Ransomware's main window that includes a list of all encrypted files. If users close the main HAHAHA Ransomware window, they can find the text copy of the ransom message in a file called 'TEXT FILE.txt' on their desktops.

Yet Another Undecryptable Ransomware Based on CryptoWire

Unfortunately, the CryptoWire Ransomware's encryption appears to be unbreakable, and this means that the files locked by the HAHAHA Ransomware are impossible to recover currently. The author of the original project states that CryptoWire is meant to erase and replace files multiple times, therefore preventing 3rd-party file recovery utilities from having any chance of restoring the data of its victims. Although a free decryptor is not available, the victims of the HAHAHA Ransomware should not believe that their files will be restored if they pay the ransom sum. There's no guarantee that the author of the HAHAHA Ransomware will not just take their money and then cease all communication with the victims.

Loading...