Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

CBT Locker virus


  • This topic is locked This topic is locked
2 replies to this topic

#1 bxguerr

bxguerr

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:08:53 AM

Posted 02 February 2015 - 02:43 PM

Good afternoon, my laptop has been infected with this CBT Locker virus. I have McAfee total protection installed but disabled it and installed Malawarebytes. After running the scan a few times, It detected three items and removed them. After rebooting, I started getting several pop ups from Malawarebytes blocking Malicious Websites Blocked: C:/Windows/SysWOW64/dllhost.exe. After searching around, I found some instruction to download and run tdsskiller. I ran it and the pop ups appear to have stopped. However, I have a few directories with personal files with a ".wrofrve" extension and I'm not sure how to recover them. example file name: 2010-06-15 04.47.00.JPG.wrofrve Any help would be greatly appreciated.

 

 



BC AdBot (Login to Remove)

 


m

#2 bxguerr

bxguerr
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:08:53 AM

Posted 03 February 2015 - 03:29 PM

can anyone help?



#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,607 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:53 AM

Posted 03 February 2015 - 09:21 PM


The newest variants of CTB Locker typically encrypt all data files and rename them as a file with a 6-7 length extension with random characters. The newer variants also do not always leave a ransom note if the malware fails to change the background, like it generally does. Compounding matters, the newer CTB-Locker infection has been seen in combination with KEYHolder, Torrent Locker (fake Cryptolocker) or Cryptowall ransomware. Unfortunately, there is still no known method of decrypting your files without paying the ransom and with dual infections, that means paying both ransoms.

A repository of all current knowledge regarding this infection is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware Support & Discussion. Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users