Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

CTB-Locker Virus. Unable to decrypt [Dutch version]


  • This topic is locked This topic is locked
2 replies to this topic

#1 Milo2015

Milo2015

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:12:50 AM

Posted 16 June 2015 - 01:59 PM

Hey all,

 

It seems to be that one of my pc's have been infected with an CTB virus.

I read to most Virus Removal posts to see if i can decrypt the files myself.

 

The problem is.. It encrypted my backup also on a mapped network share.

So restoring from there is not an option. It also cleaned out my shadow copy.

Using a restore tool like Get Data Back didnt found any of the files i was missing.

 

The antivirus caught the virus (when it was to late)

I have not found a Key.Dat file

 

I do have some copies and restores from an earlier backup about 80%. But since its my work pc some important stuff i am missing.

 

Its a dutch version of i think a TeslaCrypt or Alpha crypt locker.

 

It says the following (dutch version. Also there is a picture but i cannot attach it or implement on here) :

_____________________________________________________________________________________________
Je documenten, foto's, databases en andere belangrijke bestanden zijn versleuteld
met de sterkste encryptie en unieke sleutel, gegenereerd voor deze computer

Privé decryptie sleutel is opgeslagen op een geheime server en niemand kan je
bestanden ontsleutelen totdat er betaald is en je de sleutel ontvangt.

Als je de hoofd lock venster ziet, volg dan de instructies op van de locker.
Het lijkt erop dat u of uw antivirusprogramma de locker programma heeft verwijderd.
Nu heb je de laatste kans om uw bestanden te decoderen.

Open http://jssestaew3e7ao3q.onion.cab of http://jssestaew3e7ao3q.tor2web.org in de browser.
Het zijn publieke poorten naar de geheime server.

Bij problemen met de poorten, gebruik directe verbinding:

1. Download Tor Browser van http://torproject.org

2. In de Tor Browser open http://jssestaew3e7ao3q.onion/
   Note: Deze server is alleen beschikbaar via de Tor Browser.
   Probeer het over 1 uur als site niet bereikbaar is.

Kopieer en plak de volgende publieke sleutel in het invulformulier op de server.
[Removed key just in case]


Volg de instructies op de server.
______________________________________________________________________________________________

 

I have some encrypted files and original files and was kinda hoping for some brute force decrypting tool but i did not find it.

 

The files are named : Filename.DOCX.fnlhton (i think the last part is random but not infected another pc to try it out ! ;) )

I not seen anything like that one the forums or in the Virus Removal posts.

 

So i hope anyone is able to help.

My thank is great.

 

With regards,

 

Milo


Edited by hamluis, 16 June 2015 - 02:10 PM.
Moved from AII to Gen Security - Hamluis.


BC AdBot (Login to Remove)

 


m

#2 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:11:50 PM

Posted 16 June 2015 - 03:27 PM

Hi there,

You got infected with a variant of CTB-Locker. Please see the following quote for more information.

The newest variants of CTB-Locker typically encrypt all data files and rename them as a file with a 6-7 length extension with random characters. The newer variants also do not always leave a ransom note if the malware fails to change the background, like it generally does. Compounding matters, the newer CTB-Locker infection has been seen in combination with KEYHolderTorrentLocker (fake Cryptolocker) or CryptoWall ransomware. Unfortunately, there is still no known method of decrypting your files without paying the ransom and with dual infections, that means paying both ransoms.

A repository of all current knowledge regarding this infection is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware Support & Discussion. Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

To avoid confusion I have asked a Moderator to close this topic.

Regards,
Alex

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,563 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 PM

Posted 16 June 2015 - 06:34 PM

Closed to avoid confusion.

If you have any questions, please send me a PM.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users