Ransomware - PizzaRansom

PizzaRansom
Aliases
PizzaCrypt
Decryptor Available
No
Description

PizzaRansom received its name from the source code path found in the strings of the sample. In other words, the authors themselves surmised the name PizzaRansom. However, the researcher who discovered it, @siri_urz (Twitter), aptly dubbed it PizzaCrypt. To keep to the original name and not confuse it with another ransomware with a similar name - PizzaCrypts (notice the extra 's' on the end), we kept the name PizzaRansom and gave it the alias PizzaCrypt.

This ransomware was written in C# (.NET) and is not obfuscated. As such, we examined the source code of the sample and noticed that it used the rijndaeldManaged library to create an encryption routine using AES-256 in CFB mode. Encrypted files are given the file extension '.pizza,' and the ransomware drops a ransom note named README.txt. The ransom note gives away a lot of information without saying much. It's apparent from the extortion request that this was an early iteration of another ransomware or written as a joke/for fun. You can view the ransom note below.

Ransomware Type
Crypto-Ransomware
First Seen
Last Seen
Extortion Types
Pseudo-Extortion
Encryption
Type
Symmetric
Files
AES-256-CFB
File Extension
<file name>.pizza
Ransom Note Name
README.txt
Ransom Note Image
Samples (SHA-256)
a0aafb46fcdbc528925dea8783fa348bb1df49fa4ff216136f32d708d7605b6f
References & Publications