Ransom32 The First Ransomware JavaScript Run on Windows
Ransom32 The First Ransomware JavaScript Run on Windows

Ransom32 is a new family ransomware discovery by researchers from security firm Emsisoft. Billed as the first of its kind to use JavaScript to its source code.



Ransom32 is a new family ransomware discovery by researchers from security firm Emsisoft. Billed as the first of its kind to use JavaScript to its source code, ransom applicant was encoded via NW.js framework, formerly known as Node-WebKit. NW.js allows developers to create desktop applications for Windows, Linux and Mac OS X using JavaScript. It is based on Node.js and Chromium project and uses a lightweight version of WebKit, the rendering engine used in Chrome, Safari and Opera.

If browsers limit the interaction of JavaScript code with the underlying operating system, one of the peculiarities of NW.js platform is that it removes those limits and thus gives developers much more control and interaction with the operating system. If an application has NW.js need to be written once to be immediately usable on Windows, Linux and Mac OS X, for now, only Windows PC appear to have been infected with ransomware. As many threats, Ransom32 is generally distributed via spam campaigns.

Ransom32 The First Ransomware JavaScript Able to Run on Windows, Linux and Mac OS X

Ransom32 The First Ransomware JavaScript Able to Run on Windows, Linux and Mac OS X
Ransom32 The First Ransomware JavaScript Able to Run on Windows, Linux and Mac OS X

The malicious file is therefore attached to emails mentioning unpaid bills or notices of delivery among others. The malware works as a Ransomware as a Service (RAAS) and is distributed through intermediaries that subscription actors on a platform managed in the Tor network. This service allows any amateur to distribute the threat after setting up its own customized version of ransomware.

Also Read: How to Hack Wifi On Android

Everything you need to register and become a distributor is to provide a Bitcoin address on which the funds generated to be paid. After each payment made by a victim, the funds are transferred to the account of the authors of malware. They, therefore, recover a 25% commission prior to repay the rest of the money to distributors. At registration, future distributors ransomware access an administration page where they can perform some configurations. This page books various statistics such as the number of people who have already paid or the number of systems that have been infected.

There, they can configure the malware (completely lock the computer, low CPU usage, etc.), but also set the number of bitcoins to be paid by the victim. Once this phase is completed, they can then upload their ransomware which has a remarkable size of 22 MB

Ransom32 The First Ransomware JavaScript Able to Run on Windows, Linux and Mac OS X
Ransom32 The First Ransomware JavaScript Able to Run on Windows, Linux and Mac OS X

If in general, the size of the malware does not exceed 1 MB, this unusual case here does not mean that this is the work of an amateur, says Fabian Wosar security firm. This rather commended the encryption used by Ransom32, it compares the original cryptolocker. If Fabian was able to “break” ransomware many families in the past, he said that this new variant is now indecipherable. Regarding the payload of ransomware, it is a WinRAR self-extracting archive that contains apparently all it takes to help the malware to compromise the computer of the user.

The archive contains a copy of the GPL license agreement, but also a “chrome.exe” file is actually a packaged NW.js application. This application contains malicious code and the framework needed to run the malicious software. This means that Ransom32 is not counting on any existing framework on the user’s computer. Among other files, found in the archive a small script that identifies and removes all files and folders in a given directory. WinRAR file also includes information about configuring the malware.

Once Ransom32 is executed, so it extracts all the files in the temporary files folder and creates a shortcut in a user’s Startup folder to ensure that the malware is run every time. It can then start to encrypt user files and he asked the victim to pay a ransom within at the risk of increasing the ransom or destroyed decryption key.


COMMENTS

AUTHOR

Manpreet Singh
Manpreet Singh is young Entrepreneur who is managing Tech Viral & Also an aspiring blogger and Chief Editor for Tech Viral. He is an Experienced Blogger,SEO Expert, Digital Marketer,Certified Web Developer & Social Media Expert.