1 of 2
Danger level 6
Type: Trojans
Common infection symptoms:
  • Slow Computer
  • System crashes
  • Normal system programs crash immediatelly
  • Connects to the internet without permission
  • Installs itself without permissions
  • Can't be uninstalled via Control Panel

Afrodita Ransomware

Afrodita Ransomware uses a clever scam to slither into Windows operating systems. Our malware experts have found that the launcher of the threat is introduced to users using a fake document file sent to them via email. The name of this file could be “Invoice.xlsm,” and it is meant to convince you that the file represents important information. The message supporting this file attachment could be convincing too. If you are tricked into clicking the attachment, you are asked to enable macro, and if you do that, a malicious executable is downloaded in the form of an image file. When we analyzed the threat, the file was named “verynice.jpg,” and it was downloaded from content-delivery.in. The file was saved on the computer as “Afrodita.dll,” and it was executed immediately. As you can see, there are quite a few steps, but it is all worth the trouble for cybercriminals because, in the end, they might end up making money. If you want to avoid being scammed, you want to ignore the attackers’ message, and you want to remove Afrodita Ransomware.

Once Afrodita Ransomware is fully executed, it immediately starts encrypting files. It does not encrypt files in directories and folders that have “All Users,” “AppData,” “ProgramData,” “Program Files,” “Program Files (x86),” and “Windows” strings in their names. This is meant to prevent the threat from encrypting system files. Of course, such files could be replaced if they were encrypted, and the personal files that Afrodita Ransomware is set to encrypt might not be replaceable. Obviously, if you have backups stored outside the computer, you can replace the encrypted files, but you should do that after removing the threat. If you are not sure which files were encrypted, you can try opening them. If they are unreadable – they were encrypted. And if you do not know if you have backups for the corrupted files, you should find a secure, malware-free computer to check that. After encryption, the ransomware drops one file to the %APPDATA% directory. It is embedded within the malicious .DLL file, and it is extracted and saved as “info.jpg.” This file is meant to replace the wallpaper on your Desktop, and it displays a text message, according to which, you need to find a text file named “__README__ENCRYPTED__AFRODITA__.txt.” When this file is dropped, the infection deletes itself.

The .TXT file that Afrodita Ransomware drops is meant to convince you that if you follow instructions created by cybercriminals, you will be able to restore the encrypted files. The message suggests sending one encrypted file to afroditateam@tutanota.com and afroditasupport@mail2tor.com, so that cybercriminals could prove that your files are decryptable. It also instructs downloading the anonymous Tor browser and visiting kbcwf2hlp4on6uiwk2ygm4vv7sy6mmwkz4clj4xpgvot2kpbcfjwc6id.onion. If you do as told, it is most likely that you will be introduced to new instructions showing you how to pay for a decryptor or decryption services. If you cannot replace the corrupted files, and if you cannot find a tool that would help you recover them for free (at the time of research, such a tool did not exist), you might consider following the attackers’ demands. We do not recommend doing that because, most likely, you would end up getting scammed. Most likely, if you transfer money into the pocket of the attackers, they will fail to help you restore files. This is the same old story we have to tell the victims of DeathRansom Ransomware, Zobm Ransomware, Start Ransomware, and all other threats alike. Note that removal guides for these infections are already available on our site.

Since Afrodita Ransomware deletes itself after execution, it is most likely that you will only need to worry about the removal of .JPG and .TXT files. The manual removal guide below shows where to find and how to erase these files. Unfortunately, it is always possible that something could go wrong, and so we strongly advise using a malware scanner to check whether or not you need to eliminate Afrodita Ransomware leftovers. Better yet, install a trusted anti-malware program right away. It will automatically scan the system and delete any threats that might exist. Moreover, it will take care of your system’s protection, so that you would not need to face new threats in the future. Speaking of the future, it is crucial that you become more cautious with the spam emails you receive. Also, always backup personal files because you never know when you might need copies.

Afrodita Ransomware Removal

  1. Simultaneously tap Win+E keys to launch Explorer.
  2. Enter %APPDATA% into the quick access field at the top.
  3. Right-click the file named info.jpg and choose Delete.
  4. Set the desired wallpaper image for your Desktop.
  5. Next, Right-click and Delete all copies of __README__ENCRYPTED__AFRODITA__.txt. Every folder containing encrypted files should contain this .txt file as well.
  6. Empty Recycle Bin to complete the removal.
  7. Install and run a malware scanner to examine the system for hidden leftovers.
Download Spyware Removal Tool to Remove* Afrodita Ransomware
  • Quick & tested solution for Afrodita Ransomware removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.