3 Hours ago I noticed this terrible problem so of course I'm now trying to find a solution to get my files back without paying. I haven't made any backup unfortunately
Is there any progress here?
My .png file is named: "uhaesdfvbg" and is not encrypted (still a png file).
Also do you get your files back when you pay? I saw one person got his files back but I'm worried that this is not always the case.
We've found that "PNG" is actually an XOR'd executable - and is the actual encryptor code (further obfuscated).
I'm afraid we confirmed this is a variant of Zyklon, and has the exact same encryption/keygen code. It retrieves a key from the C2 server, so no keys are generated in the malware itself, which removes one possible way of attacking it at this point. The numbers in the filenames are actually the first 5 characters of said password, but we have no way of guessing the remaining part (I think the whole password was atleast 32 or 64 characters, can't confirm while mobile - either way, way too long to bruteforce). The numbers are actually the first 6 characters of a SHA1 of the password (32-characters), still not particularly helpful.
Afraid there is no way of decrypting this one at this time. If you decide to pay the ransom, the decrypter they provide appears to be functional (at this time from the sample we tore apart, of course it could change, so proceed with caution). This of course still goes on the assumption that the criminals will give you the key. If they give you a handful of keys (previous Zyklon victims found the criminals couldn't determine exactly which password was right for some reason, I'm assuming a collision of PC names in their database), you can simply match it with the "ID" in the filenames as stated above (first 5 characters).
Edited by Demonslay335, 12 July 2016 - 09:07 AM.