Hi everyone,
I'm investigating a new ransomware variant that uses the extension **.dthnrHygS** and drops a ransom note **dthnrHygS.README.txt** asking to contact the attacker via Session messenger.
ID-Ransomware result: *Unable to determine ransomware*
Case SHA1: d2a6099346974562db621178f98644e7f8bb241d
Victim ID (from ransom note): 030A2816BD66AFCCF0FFBA6D060B3AA6
Files are encrypted (entropy ~7.8, consistent with AES), but ZIP archives were not actually encrypted — the attacker only changed the extension (`.zip.dthnrHygS`), and I was able to open and read them (original files inside are intact).
For regular files (HTML, CSS, etc.), the data is encrypted.
I already opened a detailed thread on BleepingComputer with full analysis, file hashes, and samples:
Unknown ransomware - .dthnrHygS extension (Session messenger note) - Ransomware Help & Tech Support
If anyone from the community or MalwareHunterTeam has seen this variant or has similar reports, please let me know.
Any identification or decryptor information would be greatly appreciated.
Thank you.
I'm investigating a new ransomware variant that uses the extension **.dthnrHygS** and drops a ransom note **dthnrHygS.README.txt** asking to contact the attacker via Session messenger.
ID-Ransomware result: *Unable to determine ransomware*
Case SHA1: d2a6099346974562db621178f98644e7f8bb241d
Victim ID (from ransom note): 030A2816BD66AFCCF0FFBA6D060B3AA6
Files are encrypted (entropy ~7.8, consistent with AES), but ZIP archives were not actually encrypted — the attacker only changed the extension (`.zip.dthnrHygS`), and I was able to open and read them (original files inside are intact).
For regular files (HTML, CSS, etc.), the data is encrypted.
I already opened a detailed thread on BleepingComputer with full analysis, file hashes, and samples:
If anyone from the community or MalwareHunterTeam has seen this variant or has similar reports, please let me know.
Any identification or decryptor information would be greatly appreciated.
Thank you.
