Ransomware Research
IRIS Ransomware
IRIS is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on April 1, 2024, this ransomware has been actively targeting systems worldwide.
Quick Facts
- Ransomware Family
- IRIS
- First Seen
- April 1, 2024
How IRIS Ransomware Works
Targeted Files
e1c7acb3c47839cf78ca682222ab2eaa162b5c7faf14572f018055611adb20c6 -> doesn't change filenames
File Encryption Patterns
IRIS modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
./\.[0-9a-z]{4}$/
Ransom Note and Payment Demands
After encrypting files, IRIS displays ransom notes demanding payment for file recovery:
read_it.txt
Ransom message:
notes/read_it.txt
Note locations:
EveryFolder
READ-ME.txt
Ransom message:
notes/READ-ME.txt
Note locations:
Desktop
Ransom message:
notes/w7zuxr8ni.jpg
Note locations:
Desktop
Technical Indicators
Associated Executable Files
The following executable files are associated with IRIS ransomware:
MainRunnerqwa.exe
MAINRU~2.EXE
svchost.exe
Elastio Can Help You
Don't let IRIS ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This IRIS ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like IRIS.
Last updated: July 30, 2025