The Unrans Ransomware is a file-encryption Trojan whose primary targets appear to be running servers. The interesting thing about this particular threat is that it appears to be based on a PowerShell script, and this is not something that common in the world of ransomware. The bad news is that the Unrans Ransomware being based on PowerShell does not mean that it is decryptable, and it seems that this threat’s encryption cannot be deciphered currently.
When the Unrans Ransomware attacks a server, it will carry out a file-encryption task, which will ensure the full encryption of specific file formats – documents, media files, databases, spreadsheets, and common Web page formats are just some of the files that the Unrans Ransomware seeks to encrypt. When the attack is complete, the threat will create the file ‘RansomText.txt,’ which contains ransom instructions. The note leads users to a ‘.onion’ website, which prompts them to enter the unique victim ID found in the aforementioned text file. The attackers also offer to decrypt one file for free to reassure their victims that they will have all of their data recovered if they pay the ransom sum. While it is recommended to take advantage of this offer, we would not advise you to send any money to the Unrans Ransomware’s operators. The ransom sum they demand is 0.5 BTC (over $6,000), and sending such a ludicrous amount of money to anonymous cybercrooks can never be a good decision.
The attackers note that the decryption key needed to unlock the files will be deleted permanently, therefore making it impossible to decipher any of the files. While we can’t neither confirm nor deny this, we assure you that you will be better off relying on 3rd-party file recovery tools that don’t demand thousands of dollars to work. Keep in mind that before attempting to unlock any of the files, you must remove the files of the Unrans Ransomware by using a suitable PC security tool. In addition to this, it is also a good idea to create backup copies of the locked files since you will need them in case a free decryption application becomes available in the future.