Oled Ransomware
Posted: May 31, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 44 |
First Seen: | May 31, 2017 |
---|---|
OS(es) Affected: | Windows |
The Oled Ransomware is a Trojan that locks your files by encrypting them and creates messages asking for Bitcoins for the unlocking solution. Its introduction to new PCs may be tied to the presence of network-related vulnerabilities closely. To best counteract this threat, malware analysts suggest that you backup any important files, use safe password management, and protect your PC with anti-malware solutions for removing the Oled Ransomware in safety.
Recycling Ransoms for New Trojan Attacks
Many of the threat actors making Trojans rarely see a pressing need to put more work into their black market products than a minimum floor of competency. In some campaigns, like the latest the Oled Ransomware attacks, the new branding is the most visible sign of a Trojan that's, otherwise, a copy-paste of previous software. On the other hand, despite its close resemblance to threats like the OnyonLock Ransomware, the Oled Ransomware is representative of a credible threat to any user not paying enough attention to their network settings.
Threat actors appear to introduce the Oled Ransomware to PCs through Remote Desktop-based exploits that grant them backdoor access, and, through that vulnerability, install arbitrary programs. Post-introduction, the Oled Ransomware operates similarly to other variants of the BTCWare Trojan and scans for files to encrypt, including work or similar media, such as Microsoft Office-related content. It also appends the '.oled' extension to every encrypted filename, which malware experts have yet to see elsewhere, along with an e-mail address for its ransom negotiations.
The Trojan further promotes the ransom-based unlocking process with a dropped text note that's nearly identical to previous ones in use with BTCWare variants like OnyonLock Ransomware. Like the older Trojan, the Oled Ransomware claims that the attack is a non-specific 'security problem' and demands Bitcoin payments for any data recovery. It also bribes its victims by offering three no-charge decrypted files, as a sample.
Keeping Your Money Safe from the BTCWare Mob's Rising Star
While threat actors encourage victims to make cryptocurrency payments in short order and without thinking over the consequences, many file-locking Trojans are less than invulnerable to other data retrieval methods. Free decryption strategies are available for many versions of BTCWare, and any affected users should try unlocking their files with such assistance before paying a non-refundable Bitcoin fee. Backups also are recognized widely as a means of recovering content from threats like the Oled Ransomware, as long as you don't save the copies on the same drive.
The Oled Ransomware infections also carry network security implications that could result in other attacks against your PC or information. Double-check all networking settings, particularly for Remote Desktop setups, and change any passwords that could be in unsafe possession. Most traditional anti-malware products also may remove the Oled Ransomware and keep the Trojan from causing any other damage.
Powerful tools like RDP are just as subject to abuse as a gun. The primary difference, with Trojans like the Oled Ransomware, is that the barrel is aiming at your hard drive and your bank account instead of your body.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%APPDATA%\1sv_host.exe
File name: 1sv_host.exeSize: 66.56 KB (66560 bytes)
MD5: 4e1c53e8c46a365a3d7ad8d80c2aab27
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: May 31, 2017
%APPDATA%\guide.exe
File name: guide.exeSize: 66.56 KB (66560 bytes)
MD5: a9b86e4c328f29548ea1fd4a8e794602
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: May 31, 2017
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.