Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

TeslaCrypt ransomware changes its name to Alpha Crypt


  • Please log in to reply
96 replies to this topic

#61 Aura

Aura

    Bleepin' Special Ops


  •  Avatar image
  • Malware Response Team
  • 19,709 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:51 PM

Posted 14 May 2015 - 09:01 AM

I also found a file called "guvpahh.exe" in my msconfig -> startup which i didnt recognized before


Do you still have this file? If so, you could upload it on BleepingComputer so the Security Experts here could take a look at it.

http://www.bleepingcomputer.com/submit-malware.php?channel=3

animinionsmalltext.gif


BC AdBot (Login to Remove)

 


#62 Fleeps

Fleeps

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:51 PM

Posted 14 May 2015 - 09:14 AM

 

I also found a file called "guvpahh.exe" in my msconfig -> startup which i didnt recognized before


Do you still have this file? If so, you could upload it on BleepingComputer so the Security Experts here could take a look at it.

http://www.bleepingcomputer.com/submit-malware.php?channel=3

 

 

unfortunately, i deleted the file, but was able to restore it with the program "restoration", but it looks like its not complete. i have uploaded the file, but maybe others should have a look in "windows -> system32" to find it there (or try searching it).


Edited by Fleeps, 14 May 2015 - 09:43 AM.


#63 pmmorgan2000

pmmorgan2000

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:51 PM

Posted 14 May 2015 - 10:44 AM

I'm pretty sure I have a copy of the original .exe that encrypted all the files.



#64 TKuja

TKuja

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  

Posted 14 May 2015 - 11:46 AM


I will check this out when I get home from work, fingers crossed...
Any admin verified yet?

hi
i use it ,but dont work and give me this report:
 
((Loading data file from >> C:\Users\farhad\AppData\Roaming\key.dat
Data file version 3 recognized.
ERROR - Decryption key is not present in data file.
Unfortunatelly this tool can't recover decryption key. :-(  ))
 
 

No joy, locates key.dat and master key is there but no decryption key so results in same error as above..

#65 Tstroke

Tstroke

  •  Avatar image
  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:01:51 PM

Posted 14 May 2015 - 12:36 PM

Hello Aura,

Do you know if the file that BloodDolly is offering, has been reserched to be valid?

 

I am running scared since all the damage that the virus has caused. I would not like to introduce some other unwanted trojan or virus.

Thank you to the whole team.



#66 spidertip

spidertip

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:51 PM

Posted 14 May 2015 - 12:57 PM

BloodDolly's file is safe, whether it will work for you is another question.  I am currently testing this file with my infected computer. 


Edited by spidertip, 14 May 2015 - 12:58 PM.


#67 Aura

Aura

    Bleepin' Special Ops


  •  Avatar image
  • Malware Response Team
  • 19,709 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:51 PM

Posted 14 May 2015 - 01:07 PM

I didn't test his decrypter no. I don't have any Alpha Crypt samples to test as well so I can't really test it (plus I'm at work right now). I think someone used it in another thread and it worked but I'm not sure.

animinionsmalltext.gif


#68 Tstroke

Tstroke

  •  Avatar image
  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:01:51 PM

Posted 14 May 2015 - 01:42 PM

Hello Aura,

Thanks for the info.

And also Thanks to BloodDolly. I unfortunately was unsuccessful. It could not recover the encryption code.

Thanks again and hope there will be other variants to crack it.



#69 spidertip

spidertip

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:51 PM

Posted 14 May 2015 - 01:50 PM

All my thumbs up for - 

BloodDolly

 

It worked for me. I had to load the data.key file and select the folder to decrypt.  It asks if you want delete the original file after it cryption, choose yes because mine is copy of a copy.

 

Here is what I did:

 

1) Clicked Load data file -> Choose data.key

2) Clicked Decrypt Folder and selected a folder

 

It took about 1/2 hour for 34gb of data.  

 

I was infected May 1, with .ezz extension version. 

 

Got all my files back now.  Can't thank enough 



#70 gsmalleus

gsmalleus

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:04:51 PM

Posted 14 May 2015 - 04:16 PM

 

Ok Great. Thanks for your help guys. Hoping soon!

You can try to use my tool. Here is the link: http://www.dropbox.com/s/abcziurxly2380e/TeslaDecoder.zip?dl=0
It works only when decryption key is still present in data file (key.dat, storage.bin) or windows registry entries. Supported extensions are .ecc, .ezz, .exx.

 

 

 

Is there a way to use your tool with the RECOVERY_FILE.txt file?  I do not have the key.dat or storage.bin files.  The encrypted files in question have the .exx extension. The RECOVERY_FILE.txt contains the bitcoin address and two other strings 64 and 128 characters long.


Edited by gsmalleus, 14 May 2015 - 04:24 PM.


#71 BloodDolly

BloodDolly

  •  Avatar image
  • Security Colleague
  • 526 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Slovakia
  • Local time:09:51 PM

Posted 14 May 2015 - 04:39 PM


Is there a way to use your tool with the RECOVERY_FILE.txt file?  I do not have the key.dat or storage.bin files.  The encrypted files in question have the .exx extension. The RECOVERY_FILE.txt contains the bitcoin address and two other strings 64 and 128 characters long.

 

 

I am sorry, but it is not possible now. But I hope one day when those guys hidding behind Tesla/Alpha Crypt will be arrested it will be possible. You can only keep this file with your encrypted files stored somewhere for now.



#72 tmistry

tmistry

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:51 PM

Posted 14 May 2015 - 05:13 PM

BloodDolly - You are a legend! I cannot thank you enough! All files retrieved using your decrypter tool - i had the alphacrypt malware.  One day, justice will catch up with those behind these evil deeds! 

 

Thanks again



#73 mehrdad63

mehrdad63

  •  Avatar image
  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:21 AM

Posted 15 May 2015 - 02:30 AM

Hi guys

Is there new news??

my life stopped............. :(



#74 dinoman

dinoman

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:09:51 PM

Posted 15 May 2015 - 04:28 AM

Thank you very very much BloodDolly. Exam revision can recommence..



#75 Aura

Aura

    Bleepin' Special Ops


  •  Avatar image
  • Malware Response Team
  • 19,709 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:51 PM

Posted 15 May 2015 - 07:27 AM

Hi mehrdad63 :)

Except for BloodDolly's decrypter and the CISCO's Talos Group decrypter for TeslaCrypt and not AlphaCrypt, there's no news so far. As soon as there is an update, Grinler will post about it.

animinionsmalltext.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users