Related blog content
How ransomware gangs are connected, sharing resources and tactics
Ransom.Ragnar is Malwarebytes' detection name for a family of ransomware also known as RAGNAR_LOCKER.
Victims will find the ransome note named RGNR_<ID>.txt where <ID> is different for every victim.
Ransom.Ragnar is ransomware. Ransomware in general makes files on the victims system unusable until the ransom is payed. Ransom.Ragnar not only encrypts a victims files, but also threatens to publish them. Ransom.Ragnar is spread in the form of a preinstalled and preconfigured Windows XP virtual machine that runs the ransomware on the victim's system.
Recovering from a ransomware attack can be a painstaking process even if the victim decides to pay it can take a considerable time to recover without adequate, recent, and organized backups, or a roll-back technology.
Not paying the Ragnar_Locker ransom can lead to exposure of exfiltrated data on the dark web.
Malwarebytes can detect and remove Ransom.Ragnar without further user interaction.
Take note, however, that removing this ransomware does not decrypt your files. You can only get your files back from backups you made before the infection happened.
You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.
Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found. On the Quarantine page you can see which threats were quarantined and restore them if necessary. All component/technology detections are passed to the remediation engine for complete removal from infected systems. This industry leading technology uses patented techniques in identifying all cohorts or associated files for a single threat and removes them all together to prevent malware from resuscitating itself. If you are using Malwarebytes Ransomware Rollback technology, it allows you to wind back the clock to negate the impact of ransomware by leveraging just-in-time backups.
Select your language