Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


CryptoWall 3.0 with a Twist...HELP!!!!

  • This topic is locked This topic is locked
2 replies to this topic

#1 neno_gsxr1000


  • Members
  • 8 posts
  • Local time:07:53 AM

Posted 17 January 2015 - 04:05 AM

So, I have a client that was infected with Cryptowall 3.0 and of course, no backups.  This was on the server's shared directory...no other directory on the server was affected.  It appears that this happened over the network, however, we have scanned all 7 PCs attached to the network, and have been unable to determine which machine it came from...NONE of the machines other than the directory in question have encrypted files nor the files left over by the virus.


So, the ransom was paid (yeah, of course we already know that the ransom should never be paid, but they needed these files...about 28GB of documents).  The decrypt tool and private key were sent as stated on the ransom website, and when the software was ran (on the server), it stated that the database wasn't found and to select the folder containing the encrypted files.  We did that and it decrypted quite a few files (maybe around 100 to 200 files).  All of the files that it found and decrypted were CSV, MOV, MSG, JPG, PS, a couple of (literally 2 or 3) DOT & DOTX files, etc.,   None of the needed files (DOC, DOCX, XLSX, PDF) were decrypted...in fact, the software isn't even seeing the files at all.


Upon subsequent runs, it simply scans through the directories within 4 to 5 seconds and says COMPLETE.  


The twist to this is that all of the DOC,, DOCX, XLSX, and PDF files have a weird ".UXZHCBE" or ".ELQHCBE" extension added to the end of the original extension.  Even the TXT file that CryptoWall leaves behind is encrypted.


Upon submitting a question to the Support tab of the Ransom Page, they responded with suggestions on running the decrypt in safe mode, running using "Run as Administrator", and even had me to submit one of the encrypted files to them via sendspace.com.  After they received it, they had me to try removing the extension and running the decrypter again... all to no avail.  I submitted a couple of more questions to them, and haven't received a reply within the last couple of hours (expected).


While researching this behavior, I also found a Decrypt All Files ELQHCBE and a Decrypt All Files UXZHCBE bitmap in some of the folders...which upon opening states that the files have been encrypted with CBT-Locker.


So, the way things are looking is that these viruses were running around the same time...based on the timestamps of the HELP_DECRYPT files, Cryptowall started around 2:30p and ran until around 8:53P.  Then the first CBT-Locker virus which added the ELQHCBE extension started around 4:39P.  Then the 2nd CBT-Locker virus started around 5:10P, which added the UXZHCBE to the existing TXT files that were left by the preceding viruses (evident by files such as "Decrypt All Files elqhcbe.TXT.uxzhcbe") as well as some of it's own files (evident by "Decrypt All Files uxzhcbe.TXT.uxzhcbe").


This is truly a CLUSTER-F*CK, however the client is in desperate need of these files.  


Anybody wanna take a stab at this?!?!?

BC AdBot (Login to Remove)


#2 green_orange


  • Members
  • 37 posts
  • Gender:Male
  • Location:Egypt & UK
  • Local time:03:53 PM

Posted 17 January 2015 - 06:08 AM

Could you take some time and try this website without damaging anything?

#3 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,900 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:53 AM

Posted 17 January 2015 - 08:24 AM

A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0 & CryptoWall 3.0 is provided by Grinler (aka Lawrence Abrams), in this tutorial: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

CryptoWall 3.0 uses its new TOR gateways and has an extended deadline to pay the ransome...
see After a brief hiatus malware developers release CryptoWall 3.0. There is a lengthy ongoing discussion in this topic: CryptoWall - new variant of CryptoDefense Support & Discussion Topic.

A repository of all current knowledge regarding CTB Locker and Critroni Ransomware is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

The newest variants of CTB Locker typically encrypt all data files and rename them as a file with a 6-7 length extension with random characters. The newer variants also do not always leave a ransom note if the malware fails to change the background, like it generally does. You can check your documents folder for an image the malware normally uses...it may be labeled "decryptallfiles" or something similar. At this time there is no fix tool and no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware Support & Discussion. Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users