Shinra (8ed2354e-82ba-4338-a07c-8e3f073cc075)
SHINRA ransomware is a variant of the Proton ransomware family, known for its malicious activities involving data encryption and demanding a ransom for data decryption.
After encrypting files, the ransomware renames them with a sequence of random characters and appends the ".SHINRA3" extension to the filenames.
It is worth noting that this ransomware uses AES and ECC encryption algorithms to lock files on the victim's computer. Following the encryption, it creates a ransom note named "SHINRA-Recovery.txt."
There are not many details about its operation or methods of infecting its victims, but after encryption, the victim needs to send an email regarding recovery to the addresses provided, including their ID as generated by the ransomware:
Qq.decrypt@gmail.com Qq.encrypt@gmail.com ethan@fastmsg.info
The ransomware also changes the victim's wallpaper, displaying the need to send the data and contact the threat actor.