Precisely two months on the day since the release of its first version, the group behind the Rapid ransomware strain has released v2.0 today.
This new version has not suffered any major modifications compared to its previous release, but small changes have occurred.
The biggest is the addition of a code routine that detects the user’s PC locale settings before launching encryption operations. If the user has locale settings set to Russian, the ransomware will not encrypt files.
Second, the ransomware now adds a randomly generated string as the file extension at the end of encrypted files. Version 1.0 used “.rapid”, which allowed victims to easily detect what ransomware strain had infected their PCs.
But users now can detect they’ve been infected with Rapid 2.0 because the ransom note says so right at the top. The ransom note also uses different wording, compared to v1.0, and a subsequent updated version that was deployed in fake IRS malspam campaign.
Rapid 2.0 still relies on asking victims to get in contact with the ransomware’s operators via email. This version uses email@example.com and firstname.lastname@example.org as contact addresses.
First spotted by security researcher MalwareHunter, Rapid 2.0 seems to have been released into the wild by accident, as the ransomware’s source code was not packed and included debug messages that helped researchers quickly analyze its source code. The AVCrypt ransomware, also spotted for the first time today, was also not packed, revealing its secrets to researchers in a similar manner.
Bleeping Computer is not aware of any attempts to mass-distribute this threat at the time of writing, but the Rapid crew were quite successful at distributing v1.0, so they do have the channels in place to switch to mass-distributing v2.0 if they wish to.
Ransom note text:
- ALL YOUR FILES ARE ENCRYPTED BY RAPID 2.0 RANSOMWARE - Dont worry, you can return all your files! Attention! All your files documents, photos, databases and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase a Rapid Decryptor. This software will decrypt all your encrypted files and will delete Rapid from your PC. To get this software you need write on our e-mail: 1. email@example.com 2. firstname.lastname@example.org (if first email unavailable) What guarantees do we give to you? You can send one of your encrypted file from your PC and we decrypt him for free. But we can decrypt only 1 file for free. File must not contain valuable information Attention! Dont try to use third-party decryptor tools because it will destroy your files.
Ransom note file name: