Ransomware Research

ChineseRarypt Ransomware

ChineseRarypt is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on July 1, 2019, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: ChineseRarypt "Fake GlobeImposter".

Quick Facts

Ransomware Family
ChineseRarypt
First Seen
July 1, 2019
Known Aliases
ChineseRarypt "Fake GlobeImposter"

How ChineseRarypt Ransomware Works

Targeted Files

Current sample is BAT file Archives files with RAR .32419tiger88818 Examples -> Decryptcn@protonmail.ch_jpg.14451tiger88818;Decryptcn@protonmail.ch__.7603tiger88818 Downloads ransom note from http://47.92.55.239/s/HOW_TO_BACK_YOUR_FILES.txt https://app.any.run/tasks/bad4d05e-aff2-4353-834e-2d90f78ef5da/

File Encryption Patterns

ChineseRarypt modifies encrypted files using specific patterns to mark them as encrypted:

File extensions added after encryption:

./^Decryptcn@protonmail\.ch\w+\.[0-9]+tiger88818$/

Ransom Note and Payment Demands

After encrypting files, ChineseRarypt displays ransom notes demanding payment for file recovery:

fileHOW_TO_BACK_YOUR_FILES.txt

Ransom message:

notes/HOW_TO_BACK_YOUR_FILES.txt

Note locations:

Desktop

Technical Indicators

Associated Executable Files

The following executable files are associated with ChineseRarypt ransomware:

  • jr26.cmd

Elastio Can Help You

Don't let ChineseRarypt ransomware take over your data

Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.

About This Analysis

This ChineseRarypt ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like ChineseRarypt.

Last updated: July 30, 2025

ChineseRarypt Ransomware - Detectable by Elastio