You are most likely dealing with a newer variant of TeslaCrypt which is for the most part the same as Alpha Crypt. Any files that are encrypted with the newer unnamed variant
of TeslaCrypt will have the .exx
extension appended to the end of the filename. The .aaa/.abc variant drops files (ransom notes) with names like Recovery_File_*****.html, Recovery_File_*****.txt, restore_files_*****.html, restore_files_*****.txt files, (where ***** are random characters) and pretends to be CryptoWall 3.0
A repository of all current knowledge regarding TeslaCrypt
, Alpha Crypt
and newer variants is provided by Grinler
(aka Lawrence Abrams
), in this topic: TeslaCrypt and Alpha Crypt Ransomware Information Guide and FAQ
Information about and support for decrypting files affected by Alpha Crypt & TeslaCrypt ransomware can be found in this topic:TeslaDecoder released to decrypt .EXX, .EZZ, .ECC files encrypted by TeslaCrypt
From the above topic
BloodDolly, Post #123
Unfortunately there is no way how to decrypt .xyz, .zzz and .aaa variants without Tesla's 256 bit private key or logged request to server encrypted by AES sent before encryption started.
There are ongoing discussions in these topic:
Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in one of those topic discussions, particularly the last if dealing with one of the newer variants. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.
The BC Staff