Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Oct 24, 2017 | Updated Jan 10, 2018

Ransom:Win32/Tibbar.A

Detected by Microsoft Defender Antivirus

Aliases: Win32/Diskcoder.D (ESET) Ransom.BadRabbit (Symantec) Ransom_BADRABBIT.A (Trend Micro)

Summary

Microsoft Defender Antivirus detects and removes this threat with protection update 1.255.29.0 and higher.

This ransomware attempts to reboot your PC so it can encrypt your files. You might be able to stop your PC from rebooting and instead shut it down or run a Windows Defender Offline scan:

  • Check event logs for the following IDs: 1102 and 106
    • Event 1102 indicates that the audit log has been cleared, so previous activities can’t be seen.
    • Event 106  indicates that scheduled tasks "drogon" and "Rhaegel" have been registered (these are ransomware wipers)
  • If events 1102 and 106 are present, issue a shutdown -a to prevent a reboot

You can also immediately initiate a Windows Defender Offline scan by using PowerShell or the Windows Defender Security Center app.

This ransomware can stop you from using your PC or accessing your data. It might ask you to pay money to a malicious hacker.

This threat is also known as Bad Rabbit. It appears as a fake Adobe Flash Player update.

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. Trends show that Windows 7 devices are more likely to encounter ransomware compared to Windows 10 devices.

Read our latest report: A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017.

Microsoft doesn’t recommend you pay the ransom. There is no guarantee that paying the ransom will give you access to your files.

If you've already paid, see our ransomware page for help on what to do now.

Review logs and shutdown or run Windows Defender Offline

This ransomware attempts to reboot your PC so it can encrypt your files. You might be able to stop your PC from rebooting and instead shut it down or run a Windows Defender Offline scan:

  • Check event logs for the following IDs: 1102 and 106
    • Event 1102 indicates that the audit log has been cleared, so previous activities can’t be seen.
    • Event 106  indicates that scheduled tasks "drogon" and "Rhaegel" have been registered (these are ransomware wipers)
  • If events 1102 and 106 are present, issue a shutdown -a to prevent a reboot

You can also immediately inititate a Windows Defender Offline scan by using PowerShell or the Windows Defender Security Center app.

Run antivirus or antimalware software

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find hidden malware.

Advanced troubleshooting

To restore your PC, you might need to download and run Windows Defender Offline. See our advanced troubleshooting page for more help.

You can also ask for help from other PC users at the Microsoft virus and malware community.

If you’re using Windows XP, see our Windows XP end of support page.

Use cloud protection

Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10. 

Go to All settings > Update & security > Windows Defender and make sure that your Cloud-based Protection settings is turned On.

Follow us