Tianrui is a newly discovered ransomware strain that encrypts files and demands a ransom for decryption. It follows the tactics of other notorious ransomware families, including Hush, MoneyIsTime, and Boramae, and threatens victims with data leaks if they refuse to pay. This malware was identified by cybersecurity researchers during a routine inspection of VirusTotal submissions and is known for appending .tianrui to encrypted files.
Once the encryption is complete, Tianrui drops a ransom note in a text file named “README.TXT”, which warns victims that their files have been encrypted and will be leaked if they fail to comply with the attackers’ demands. Victims are encouraged to contact the attackers through Session messenger or tianrui@mailum.com, and if they respond within 12 hours, the ransom is reduced by 50%.
Threat Summary
Attribute | Details |
---|---|
Threat Name | Tianrui ransomware |
Threat Type | Ransomware, Crypto Virus |
Encrypted File Extension | .{victim’s_ID}.tianrui |
Ransom Note File | README.TXT |
Contact Details | Session messenger, tianrui@mailum.com |
Detection Names | Avast (Win32:RansomX-gen [Ransom]), DrWeb (Trojan.MulDrop29.19664), ESET-NOD32 (A Variant Of Win32/Filecoder.OOW), Kaspersky (UDS:Trojan-Ransom.Win32.Generic), Microsoft (Trojan:Win32/FileCoder.ARAE!MTB) |
Symptoms of Infection | Files renamed with “.tianrui”, ransom note appears, encrypted files cannot be opened |
Distribution Methods | Phishing emails, drive-by downloads, torrents, fake software updates |
Damage | Data encryption, financial loss, potential data leaks, reputational harm |
Danger Level | Extremely High |

Remove Tianrui Ransomware
With SpyHunter
Ransom Note Text
The ransom note left by Tianrui ransomware states the following:
“Your files have been encrypted. To recover them, you must contact us immediately.
If you do not reach out within 12 hours, your company’s data, including financial records, databases, email contents, and employee details, will be leaked to hacker groups.
Additionally, this cyberattack will be made public, damaging your reputation.
Do not attempt to decrypt the files manually or use third-party tools, as this may render decryption impossible.
Contact us via Session messenger or email at tianrui@mailum.com for further instructions.”
How Tianrui Ransomware Works
Tianrui operates like most ransomware strains—encrypting files with a strong algorithm and making decryption nearly impossible without the attacker’s decryption tool. Victims are warned not to seek help from third parties, as this may permanently lock their files. Even if a ransom is paid, there is no guarantee that the cybercriminals will provide a working decryption key.
Distribution Methods
Tianrui ransomware is typically spread through:
- Malicious email attachments with infected macros
- Torrents and cracked software downloads
- Drive-by downloads from compromised or malicious websites
- Fake software updates
- Social engineering attacks
Symptoms of Infection
- Files become inaccessible and are appended with a unique ID and the “.tianrui” extension
- A ransom note (“README.TXT”) is created, demanding payment
- The system slows down due to malicious encryption processes
- Cybercriminals threaten to leak sensitive company data
Damage and Consequences
Tianrui ransomware causes severe data loss and financial risks. Since it threatens public data exposure, victims not only lose access to their files but also face potential reputational damage and legal consequences if sensitive information is leaked. Additionally, ransomware infections are often accompanied by other malware, such as password stealers and banking trojans, increasing the overall damage.
Manual Ransomware Removal Process
Important: Manual removal is recommended only for experienced users, as incorrect actions can lead to data loss or incomplete removal of the ransomware. If unsure, consider the SpyHunter Removal Method for a guided, automated solution.
Step 1: Disconnect from the Internet
- Immediately disable Wi-Fi or unplug the Ethernet cable to prevent the ransomware from communicating with remote servers.
- This can prevent additional encryption or further infections.
Step 2: Boot into Safe Mode
For Windows Users
- Windows 10/11:
- Press Windows + R, type
msconfig
, and press Enter. - Under the Boot tab, select Safe boot and check Network.
- Click Apply, then OK, and restart your PC.
- Press Windows + R, type
- Windows 7/8:
- Restart your PC and press F8 repeatedly before Windows starts.
- Select Safe Mode with Networking and press Enter.
For Mac Users
- Restart your Mac and hold the Shift key immediately after the startup chime.
- Release the key when the Apple logo appears.
- Your Mac will boot in Safe Mode.
Step 3: Identify and Terminate Malicious Processes
Windows
- Open Task Manager by pressing Ctrl + Shift + Esc.
- Look for unusual processes consuming high CPU or memory.
- Right-click on the suspicious process and select End Task.
Mac
- Open Activity Monitor (Finder > Applications > Utilities > Activity Monitor).
- Look for unknown or high-resource-consuming processes.
- Select the suspicious process and click Force Quit.
Step 4: Delete Ransomware Files
Windows
- Open File Explorer and navigate to:
C:\Users\[Your Username]\AppData\Local
C:\Users\[Your Username]\AppData\Roaming
C:\Windows\System32
- Identify and delete suspicious files (randomly named or recently modified items).
- Clear temporary files:
- Press Windows + R, type
%temp%
, and hit Enter. - Delete all files in the Temp folder.
- Press Windows + R, type
Mac
- Open Finder and select Go > Go to Folder.
- Type
~/Library/Application Support
and check for unfamiliar files or folders. - Remove unknown
.plist
files from~/Library/LaunchAgents
.
Step 5: Remove Ransomware Entries from Registry or System Settings
Windows
- Press Windows + R, type
regedit
, and hit Enter. - Navigate to:
HKEY_CURRENT_USER\Software
HKEY_LOCAL_MACHINE\Software
- Identify and delete ransomware-related registry entries.
Mac
- Open System Preferences > Users & Groups.
- Select the Login Items tab and remove any unknown startup programs.
- Check
~/Library/Preferences
for malicious settings.
Step 6: Restore System Using a Backup or Restore Point
Windows
- Press Windows + R, type
rstrui
, and press Enter. - Choose a restore point from before the infection and proceed.
Mac
- Restart your Mac and enter macOS Utilities by holding Command + R.
- Select Restore from Time Machine Backup and restore a safe backup.
Step 7: Attempt to Decrypt Files
- Check No More Ransom (www.nomoreransom.org) for available decryption tools.
- If unavailable, restore files from backups.
Automated Ransomware Removal with SpyHunter

Remove Tianrui Ransomware
With SpyHunter
If manual removal is too complex or risky, SpyHunter offers a safer, automated method for detecting and removing ransomware.
Step 1: Download SpyHunter
- Get SpyHunter from the official Enigma Software website.
Step 2: Install SpyHunter
- Open the downloaded file (
SpyHunter-Installer.exe
or.dmg
for Mac users). - Follow the installation prompts.
- Launch SpyHunter upon completion.
Step 3: Run a Full System Scan
- Click Start Scan Now to detect malware and ransomware.
- Wait for the scan to complete and review detected threats.
Step 4: Remove Detected Ransomware
- Click Fix Threats to remove identified ransomware components.
- SpyHunter will clean your system automatically.
Step 5: SpyHunter’s Custom Malware HelpDesk
- If ransomware persists, use SpyHunter’s Malware HelpDesk for custom malware fixes.
Step 6: Restore Files
- Use backups stored on external drives or cloud storage.
- If no backup is available, check No More Ransom for decryption tools.
Preventing Future Ransomware Attacks
- Keep backups: Use cloud storage or an external hard drive.
- Install a reliable security tool: SpyHunter offers real-time protection against malware.
- Enable Windows Defender or Mac security features for additional protection.
- Avoid phishing emails and unknown attachments.
- Regularly update Windows, macOS, and installed applications.