{"id":2747,"date":"2024-09-25T19:48:52","date_gmt":"2024-09-25T19:48:52","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2747"},"modified":"2025-07-29T06:37:08","modified_gmt":"2025-07-29T06:37:08","slug":"how-to-save-your-files-from-hitler-ransomware","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/how-to-save-your-files-from-hitler-ransomware\/","title":{"rendered":"How to save your files from Hitler ransomware"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/hitler.webp\" alt=\"\" class=\"wp-image-2761\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/hitler.webp 225w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/hitler-150x150.webp 150w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure>\n<\/div>\n\n\n<p>Hitler Ransomware was first discovered last year, and since then it has continued to target European Windows users with its destructive brand of malware.\u00a0<br><br>Upon successful infection, it extracts the following files into the system\u2019s %Temp% folder: chrst.exe, ErOne.vbs, and firefox32.exe.\u00a0<br><br>&#8220;firefox32.exe&#8221; is also copied into the Windows startup folder so it can be automatically launched upon system reboot.\u00a0<br><br>Upon reboot, the ransomware checks for the existence of the following processes, and, if found running, kills them: taskmgr, utilman, sethc, and cmd.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"831\" height=\"627\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-49.webp\" alt=\"\" class=\"wp-image-2748\"\/><\/figure>\n\n\n\n<p>This malware removes the extensions for all files in various directories, displays a lock screen with a one-hour countdown message, and demands you enter a cash code for a 25 Euro Vodafone Card as payment before the timer runs out. Failing to enter the code within an hour leads the system to reboot, which in turn deletes most files on the victim computer.\u00a0<br><br><strong>File Details \u00a0<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Type&nbsp;<\/td><td>Portable Executable (PE) File<\/td><\/tr><tr><td>Md5 hash&nbsp;<\/td><td>e64dbe09fc1805177d9058a40807e128(packed)<br>57381bc089724b9ee6fa65bf7a56800a(unpacked)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis<\/strong><br><br>This first thing our static analysis uncovered was that Hitler ransomware is packed with a UPX packer (unpacked as shown below):<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"661\" height=\"196\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-47.webp\" alt=\"\" class=\"wp-image-2749\"\/><\/figure>\n\n\n\n<p>Unpacking the malware revealed the below strings and functionality:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"778\" height=\"641\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-46.webp\" alt=\"\" class=\"wp-image-2750\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"564\" height=\"673\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-47.webp\" alt=\"\" class=\"wp-image-2751\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"390\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-44-1024x390.webp\" alt=\"\" class=\"wp-image-2752\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"525\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-42-1024x525.webp\" alt=\"\" class=\"wp-image-2753\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"755\" height=\"417\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-40.webp\" alt=\"\" class=\"wp-image-2754\"\/><\/figure>\n\n\n\n<p>\u00a0 \u00a0 \u00a0<br><br><strong>Dynamic Analysis<\/strong>\u00a0<br><br>Our researchers executed the ransomware in a virtual environment to see how it behaves in the real world.\u00a0<br><br>The first thing we noticed was the sample scanning the computer for particular file attributes, using the following command:<br><br>\u00a0\u00a0 \u00a0\u201cicacls.exe icacls . \/grant Everyone:F \/T \/C \/Q\u201d<br><br>It then accesses Windows command line utility (cmd.exe), and uses vssadmin.exe to delete volume shadow copies of the system (as shown below):\u00a0<br><br>cmd.exe cmd \/c vssadmin delete shadow \/all \/quiet &amp; wmic shadowcopy delete &amp; bcdedit \/set {default} boostatuspolicy ignoreallfailures &amp; bcdedit \/set {default} recoveryenabled no &amp; wbadmin delete catalog \u2013quiet<br><br>Now the \u2018encryption\u2019 phase begins, with the following pop-up displayed onto the victim\u2019s PC<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"485\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-36.webp\" alt=\"\" class=\"wp-image-2755\"\/><\/figure>\n\n\n\n<p>Next, all the victim\u2019s files have their extensions replaced with .AdolfHitler: \u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"744\" height=\"679\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-32.webp\" alt=\"\" class=\"wp-image-2756\"\/><\/figure>\n\n\n\n<p>Below are the network activity observations:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"615\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-31-1024x615.webp\" alt=\"\" class=\"wp-image-2757\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"305\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-22-1024x305.webp\" alt=\"\" class=\"wp-image-2758\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"541\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-17-1024x541.webp\" alt=\"\" class=\"wp-image-2759\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-14-1024x585.webp\" alt=\"\" class=\"wp-image-2760\"\/><\/figure>\n\n\n\n<p>The ransomware also adds the following registries to ensure persistence:<br><br>\u2022\u00a0\u00a0 \u00a0HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\Adolf Hitler: &#8220;C:\\Users\\&lt;user-name>\\Desktop\\sample.exe&#8221;<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-21-1265348393-3129211107-4082868339-1000\\Software\\Classes\\VirtualStore\\MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\Adolf Hitler: &#8220;C:\\Users\\&lt;user-name>\\test\\Desktop\\sample.exe&#8221;<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-21-1265348393-3129211107-4082868339-1000\\Software\\Microsoft\\Internet Explorer\\LowRegistry\\Audio\\PolicyConfig\\PropertyStore\\8bd7da89_0\\: &#8220;{0.0.0.00000000}.{90a75006-e5fb-494e-8926-42d3ba714ca7}|\\Device\\HarddiskVolume2\\Users\\&lt;user-name>\\\\Desktop\\sample.exe%b{00000000-0000-0000-0000-000000000000}&#8221;<br><br><strong>Indicators of Compromise\u00a0<\/strong><br><br>Command and Control:\u00a0<br><br>\u2022\u00a0\u00a0 \u00a0103.235.46.40<br><br>\u2022\u00a0\u00a0 \u00a0baidu[.]com<br><br>\u2022\u00a0\u00a0 \u00a0163[.]com<br><br>\u2022\u00a0\u00a0 \u00a0123.125.93.50<br><br>\u2022\u00a0\u00a0 \u00a0183.238.101.233<br><br>\u2022\u00a0\u00a0 \u00a02017[.]ip138[.]com<br><br><strong>MD5 file hashes<\/strong>\u00a0<br><br>\u2022\u00a0\u00a0 \u00a0e64dbe09fc1805177d9058a40807e128<br><br>\u2022\u00a0\u00a0 \u00a057381bc089724b9ee6fa65bf7a56800a<br><br><strong>Mitigation<\/strong>\u00a0<br><br>Unfortunately, the Hitler ransomware\u2019s distribution method is currently unknown.\u00a0<br><br>However, some specific tips for what to do after you\u2019ve been infected (and before the countdown timer runs out) include:\u00a0<br><br>As the malware relies on the system being rebooted, you should boot your system in \u201cSafe Mode with Networking\u201d, then find and delete the following entry:<br><br>C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\firefox32.exe;<br><br>Then, delete the following entries, which are stored in the %Temp% folder:<br><br>\u2022\u00a0\u00a0 \u00a0chrst.exe<br><br>\u2022\u00a0\u00a0 \u00a0firefox32.exe<br><br>\u2022\u00a0\u00a0 \u00a0ErOne.vbs<br><br>Although this strain\u2019s specific distribution method is unknown, general cyber hygiene (such as keeping antivirus updated with the latest virus definitions and including the IOCs in endpoint devices) will help reduce the risk of infection.\u00a0<br><br>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hitler Ransomware was first discovered last year, and since then it has continued to target European Windows users with its destructive brand of malware.&nbsp; Upon successful infection, it extracts the following files into the system&rsquo;s %Temp% folder: chrst.exe, ErOne.vbs, and firefox32.exe.&nbsp; &ldquo;firefox32.exe&rdquo; is also copied into the Windows startup folder so it can be automatically [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2761,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2747","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2747"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2747\/revisions"}],"predecessor-version":[{"id":4309,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2747\/revisions\/4309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2761"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}