Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Original CryptoWall Ransomware Support and Help Topic - DECRYPT_INSTRUCTION.html


  • Please log in to reply
1524 replies to this topic

#136 leechina

leechina

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:46 AM

Posted 31 May 2014 - 05:45 PM

i have a same problem like all people here. was infected all docs, db and other files was crypted .  Boss gave me 5 days to get my files back . i tried decrypt files by myself but IT WAS a BIG MISTAKE , because when i try to decrypt by myself i corrupt alghorithm , after payment  i received decrypt.zip  .  But not all my files was decrypted. I contacted to Cryptowall support and they help me to understand why my files was not decrypted.



 


    until about 20 hours later in which we received a notice saying we couldn't contact the server

 


I think you must contact to their support. i am sure they will help you. if you real made payment :guitar:

Ronny_Add

I have same problem with dbf files.  I contacted with IT specialist and he help me undestand  that it was   crypted by "CryptoLocker"  and i need to pay again :nono:

but it was only   14 files  other 387 was not crypted and i decrypt it by decrypt.zip succesefull. it's may be 2 virus at the site from which you was infected. i,t's very hard to my mind
 



BC AdBot (Login to Remove)

 


#137 Neatoboy

Neatoboy

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:06:46 AM

Posted 31 May 2014 - 06:35 PM

i have a same problem like all people here. was infected all docs, db and other files was crypted .  Boss gave me 5 days to get my files back . i tried decrypt files by myself but IT WAS a BIG MISTAKE , because when i try to decrypt by myself i corrupt alghorithm , after payment  i received decrypt.zip  .  But not all my files was decrypted. I contacted to Cryptowall support and they help me to understand why my files was not decrypted.



 


    until about 20 hours later in which we received a notice saying we couldn't contact the server

 

I think you must contact to their support. i am sure they will help you. if you real made payment :guitar:

Ronny_Add

I have same problem with dbf files.  I contacted with IT specialist and he help me undestand  that it was   crypted by "CryptoLocker"  and i need to pay again :nono:

but it was only   14 files  other 387 was not crypted and i decrypt it by decrypt.zip succesefull. it's may be 2 virus at the site from which you was infected. i,t's very hard to my mind
 

Are you able to upload the decrypt.zip file somewhere like dropbox please so I and others can download it?



#138 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:04:46 PM

Posted 31 May 2014 - 06:58 PM

Other victim decrypters will not help you. They all have a unique RSA key in them. Sorry.


Have you performed a routine backup today?

#139 Neatoboy

Neatoboy

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:06:46 AM

Posted 31 May 2014 - 07:29 PM

Other victim decrypters will not help you. They all have a unique RSA key in them. Sorry.

Yes I understand that but I think I've worked out a way to decrypt my client's files but all I need is the software to do it.



#140 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:04:46 PM

Posted 31 May 2014 - 08:30 PM

Unless you have found a way to factor a 2048 RSA key with todays technology, or found a glitch where the key is found, i dont see how thats possible. I have looked in the assembly and pseudo code of this infection and its confirmed as RSA. Its CryptoDefense with a different name. Fabian found a glitch in an older version, but that since has been patched up.

 

Sorry.


Have you performed a routine backup today?

#141 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:04:46 PM

Posted 31 May 2014 - 08:31 PM

Also the decrypter is the exact same as CryptoDefense, Which is a very public EXE. Search around on google, you will find it if you really want it, but like i said, Its RSA 2048.


Have you performed a routine backup today?

#142 fleur711

fleur711

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 02 June 2014 - 09:45 AM

I currently have the same problem. I can access my windows photo gallery and see the pictures but I can't email them (they email over as blank)or I can't open them individually (it says the file appears to be damaged or corrupted)

 

In my Documents I have a folder called;

decrypt_cryptodefense and in that folder is; CryptoOffense.exe and decrypt_cryptodefense.exe.

 

Will it help if I delete these exe files? How do I do that?

 

In my Downloads I have the following (3) files;

DECRYPT_INSTRUCTION.TXT

DECRYPT_INSTRUCTION.HTML

DECRYPT_INSTRUCTION

 

Should I also delete these files? How do I do that?

 

Thanks in advance for any help!



#143 littlehoughton

littlehoughton

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:09:46 PM

Posted 03 June 2014 - 06:31 AM

Interesting update

 

http://www.theguardian.com/technology/2014/jun/02/cryptolocker-virus-nca-malware-protection

 

I doubt anyone infetected wanting to pay ransom is out of luck while they are on the run.



#144 Grinler

Grinler

    Lawrence Abrams


  •  Avatar image
  • Admin
  • 45,396 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:46 PM

Posted 03 June 2014 - 10:19 AM

I am not sure that they are connected to the same people.

#145 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:04:46 PM

Posted 03 June 2014 - 10:26 AM

Grinler is correct,  This hasn't made any other ransom except cryptolocker skip a beat.


Have you performed a routine backup today?

#146 deedeen

deedeen

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:46 PM

Posted 04 June 2014 - 09:36 AM

I had to reload the OS on a computer that got hit with cryptobit, and the old os is still there under windows.old.  The computer owner is willing to pay the "ransom".  but, if he does indeed get what he needs from the hackers to unencrypt his files, will it be able to with a brand new OS loaded on the pc?  also, a month has passed since he got the virus so I don't know if there is a time limit the hackers put on their "fix".  thanks for any help or advice.  



#147 Tarpontoo

Tarpontoo

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:04:46 PM

Posted 04 June 2014 - 09:40 PM

I paid the ransom, got the decrypter. after 4 days it operated slower each day.One day it decrypted 4 files while I still had 20,00 + file to go. It also failed to decrypt many files."decrpt failed"saveyourmoney.these criminals will not help you. FWIW, I had a carbonite back up that is restoreing all my filesand they are on top of the Cryptowall.

#148 TTPinc

TTPinc

  •  Avatar image
  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Great (French) White North
  • Local time:03:46 PM

Posted 05 June 2014 - 11:00 AM

Just got infected from an email that contained a fax message.

I had downloaded it to a separate external drive, but it the files to my Dropbox account 

It copied the 3 files to every other drive connected to my PC (except the network drives), and EVERY dropbox folder...

 

I was able to stop the dropbox synching and manually dele all the newly created files, but not sure if I got to them in time.


Edited by TTPinc, 05 June 2014 - 11:55 AM.


#149 BDClark

BDClark

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:46 PM

Posted 05 June 2014 - 12:14 PM

TTPinc, we got the same thing then.  It looks like it didn't hit any of our network shares either.  Looking at HKCU\Software\"random numbers"\CRYPTLIST and every file listed is on the local machine.  One of our terminal server users ran it and it appears to be solely on that user's profile.  I don't see any evidence of it hitting the shares.  I'm going to probably wipe the two workstations that got hit, and I'm hoping that just deleting that one profile from the terminal server will be OK.



#150 TTPinc

TTPinc

  •  Avatar image
  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Great (French) White North
  • Local time:03:46 PM

Posted 05 June 2014 - 02:57 PM

DClark: 

It does propagate to the network shares. It got to my server but doesn't seem to have gotten to my "D mybook live external drive.

check in any "Download" folder on those and you'll find copies of it.

I found that doing a search from start menu search box seemed to find most of them






2 user(s) are reading this topic

0 members, 2 guests, 0 anonymous users