Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Encrypted Files by malware


  • This topic is locked This topic is locked
3 replies to this topic

#1 jnrowe

jnrowe

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:12:09 AM

Posted 07 March 2015 - 02:19 PM

A malwareware program hit my computer and encrypted alot of files. The malware has been removed. Is there a way to unencrypt the files. I used Shadow Explorer and was able to recover some of the files on C drive. The program would not show the E Drive at all and the files there are still encrypted. This malware also hit all my Windows Live Emails.



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,289 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:09 AM

Posted 07 March 2015 - 03:45 PM

What type of crypto ransomware are you dealing with? Are there any file extensions appended to your files...such as .ecc, .CTBL, .CTB2, .XTBL or 6-7 length extension consisting of random characters?

Did you find any ransom note? These infections are created to alert victims that their data has been encrypted and demand a ransom payment. Check your documents folder for an image the malware typically uses for the background note. Check the C:\ProgramData (or C:\Documents and Settings\All Users\Application Data) for a random named .html, .txt, .png, .bmp, .url file.

These are some examples.
DECRYPT_INSTRUCTION.TXT, DECRYPT_INSTRUCTION.HTML, DECRYPT_INSTRUCTION.URL
HELP_DECRYPT.TXT, HELP_DECRYPT.HTML, HELP_DECRYPT.URL, HELP_DECRYPT.PNG
HELP_TO_DECRYPT_YOUR_FILES.bmp, HELP_TO_DECRYPT_YOUR_FILES.txt
RECOVERY_KEY.txt

Does it look like one of these or something else...?
* PClock (WinCL variant)
* PClock (newer Windsk variant)
* TeslaCrypt
* CryptoWall
* TorrentLocker
* CryptoFortress
* CTB-Locker
* KEYHolder

If the ransomware does not look like any of those in the above links...reading through the following information may assist with identifying the crypto malware infection you are dealing with.Once you have identified which particular ransomware you are dealing with, we can direct you to the appropriate discussion topic for further assistance.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 jnrowe

jnrowe
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:12:09 AM

Posted 07 March 2015 - 05:45 PM

here it is:  it says the files were encrypted with RSA-2048 using cryptowall 3.0



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,289 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:09 AM

Posted 07 March 2015 - 06:57 PM

A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0 & CryptoWall 3.0 is provided by Grinler (aka Lawrence Abrams), in this tutorial: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

Reading that Guide will help you understand what CryptoWall (including versions 2.0 & 3.0) does and provide information for how to deal with it. Cryptowall typically deletes all Shadow Volume Copies with vssadmin.exe so that you cannot restore your files via System Restore or using a program like Shadow Explorer...but it never hurts to try. At this time there is no fix tool and Decryption of any CryptoWall Files...is impossible since there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

There is also a lengthy ongoing discussion in this topic: CryptoWall - new variant of CryptoDefense Support & Discussion Topic.

Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users