We have recently received a sample of a ransomware-type application known as Alex.vlasov@aol.com Ransomware. Its objective is to encrypt most of the files located on your PC’s hard drive and demand that you pay a ransom for the decryption tool necessary to get them back. However, you should consider removing it because there is no guarantee that its developers will keep their word and give you the decryptor. We have tested this malicious application and, in this article, we will provide you with all of the information that we have managed to extract.
We purposefully infected one of our test computers with this ransomware several times, and we found that it can drop its malicious executable in %ALLUSERSPROFILE%\Application Data\Microsoft\Windows\Start Menu\Programs, %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs, %USERPROFILE%\Microsoft\Windows\Start Menu\Programs, %APPDATA%\Microsoft\Windows\Start Menu\Programs, %ALLUSERSPROFILE%\Start Menu\Programs or %APPDATA%. The location where its dropper file places the randomly executable varies with each case. The main executable’s name can vary in length and symbol arrangement, so the name does not make sense. Furthermore, it can use uppercase and lowercase letters, so you should be able to identify it without having an issue.
Alex.vlasov@aol.com Ransomware does not lock the screen, but encrypts the files only. It uses the RSA-2048-bit algorithm to encrypt them. This algorithm is quite strong, and there is no way to decrypt the files that have been encrypted by this particular ransomware. It is set to encrypt hundreds of file formats such as image, video, and audio files, as well as documents and executables. Therefore, you will be unable to access your personal files or launch most of the applications present on your PC. This ransomware adds the .id-78684129.{alex.vlasov@aol.com}.xtbl extension to all encrypted files which is an indication that they have been encrypted. Once the encryption process is complete, it will change the desktop wallpaper with an image named How to decrypt your files.jpg and drop a file named How to decrypt your files.txt on the desktop, but it can also drop it in each folder where a file was encrypted. These files are ransom notes, but all they say is that you need to contact “technical support” which is a fancy way of saying that you need to contact the cyber crooks that got your PC infected with this ransomware.
We do not know how much money the criminals want you to pay in exchange for the decryptor, but we have found that this ransomware’s developer have also created Saraswati Ransomware that demands that you pay up to 3 BTC which is an approximate $1412 USD. Therefore, we believe Alex.vlasov@aol.com Ransomware should also demand a similar sum of money which is a lot. Also, this ransomware is similar to Redshitline Ransomware, and Green_ray Ransomware. All of these extensions come from the same developers based somewhere in India.
We have found that, like its predecessors, Alex.vlasov@aol.com Ransomware is disseminated using email spam. We think that its developers have set up a server dedicated to sending email spam that contains an attachment that serves as the dropper file that injects the main executable in one of the locations mentioned above. The email spam can masquerade as legitimate business correspondence, invoices, receipts and tax return forms, so you can be tricked into opening the malicious attachment.
In closing, Alex.vlasov@aol.com Ransomware is the type of program that can enter your computer without your knowledge or consent via email spam. So if you got it on your computer, then we recommend that you remove it using the instructions provided below. However, if you have trouble identifying its locations, then we suggest using SpyHunter, our featured anti-malware scanner which is capable of detecting and eradicating this ransomware in its entirety.