Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Paid for Cryptowall decryption, but it doesnt seem to work.


  • This topic is locked This topic is locked
3 replies to this topic

#1 Adeeelnv

Adeeelnv

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:10 PM

Posted 12 June 2015 - 01:06 AM

I work at a computer shop. A customer got their business computer infected with Cryptowall 3. He paid to get the decryption key.

 

I downloaded the cryptowall 3 decrypter from the website. It can see the computer is infected. It scans, find files and says it decrypts them. But not all of them.

 

Im starting to think there are two different versions of the virus. if you look at this first example, it finds a file and says it has decrypted it

UxY8Vzx.png

 

But then there are all these other files with a .jpwkczk extension that it doesnt even attempt to decrypt.

xRs7cMW.png

 

I had one idea that maybe it needs those four Help_Decrypt files in the folder to trigger the program, but that doesnt work either.

 

Im pretty sure the program is telling the truth when it says it has decrypted a file. Almost all of the files without that weird extension seem to work now. Some others dont because it cant decrypt them for some reason

VGr5B33.png

 

Its really weird, Im not sure what to do now. The customer has basically wasted $500.



BC AdBot (Login to Remove)

 


#2 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:04:10 PM

Posted 12 June 2015 - 01:27 AM

Hello,

In your customer's case he got infected with both CryptoWall 3.0 and another ransomware named CTB-Locker. So he will also have to pay the ransom for CTB-Locker if he wants his files back.

Please see the following quotes from Global Moderator quietman7 for more information about both ransomware.

A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0 & CryptoWall 3.0 is provided by Grinler (aka Lawrence Abrams), in this topic: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

Reading that Guide will help you understand what CryptoWall (including versions 2.0 & 3.0) does and provide information for how to deal with it. Cryptowall typically deletes all Shadow Volume Copies with vssadmin.exe so that you cannot restore your files via System Restore or using a program like Shadow Explorer...but it never hurts to try. At this time there is no fix tool and Decryption of any CryptoWall Files...is impossible since there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

There are also lengthy ongoing discussion in these topics:

Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

The newest variants of CTB-Locker typically encrypt all data files and rename them as a file with a 6-7 length extension with random characters. The newer variants also do not always leave a ransom note if the malware fails to change the background, like it generally does. Compounding matters, the newer CTB-Locker infection has been seen in combination with KEYHolderTorrentLocker (fake Cryptolocker) or CryptoWall ransomware. Unfortunately, there is still no known method of decrypting your files without paying the ransom and with dual infections, that means paying both ransoms.

A repository of all current knowledge regarding this infection is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware Support & Discussion. Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

To avoid confusion, I have asked a Moderator to close this topic.

Regards,
Alex

#3 Adeeelnv

Adeeelnv
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:10 PM

Posted 12 June 2015 - 01:46 AM

ok, thanks for that



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,122 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:10 AM

Posted 12 June 2015 - 05:00 AM

To avoid confusion, this topic is closed.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users