Ransomware Research

BTCWare-Aleta Ransomware

BTCWare-Aleta is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on July 1, 2017, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Aleta.

Quick Facts

Ransomware Family
BTCWare-Aleta
First Seen
July 1, 2017
Known Aliases
Aleta

How BTCWare-Aleta Ransomware Works

Targeted Files

Full extension -> .[black.block@qq.com].aleta https://www.bleepingcomputer.com/forums/t/651857/help-recovered-files-averiaswqqcomaleta/

File Encryption Patterns

BTCWare-Aleta modifies encrypted files using specific patterns to mark them as encrypted:

File extensions added after encryption:

..aleta

Ransom Note and Payment Demands

After encrypting files, BTCWare-Aleta displays ransom notes demanding payment for file recovery:

file!#_READ_ME_#!.inf

Ransom message:

notes/!#_READ_ME_#!.inf

Note locations:

EveryFolder
file!#_READ_ME_#!.txt
file!#_READ_ME_#!.hta

Ransom message:

notes/!#_READ_ME_#!.hta

Note locations:

EveryFolder
fileInfo.hta
screenshot

Ransom message:

notes/1.png

Note locations:

Desktop

Technical Indicators

Associated Executable Files

The following executable files are associated with BTCWare-Aleta ransomware:

  • darkwaiderr@cock.li.ex_
  • darkwaiderr@cock.li.exe
  • 2.exe
  • SMSCHAT.EXE.%5BBLACK.MIRROR%40QQ.COM%5D.ALETA

Recovery and Decryption Tools

Good news! Decryption tools are available for BTCWare-Aleta ransomware:

0

Elastio Can Help You

Don't let BTCWare-Aleta ransomware take over your data

Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.

About This Analysis

This BTCWare-Aleta ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like BTCWare-Aleta.

Last updated: July 30, 2025