Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Crypto Varient on PC


  • This topic is locked This topic is locked
1 reply to this topic

#1 Tangy4

Tangy4

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:44 PM

Posted 03 December 2015 - 02:55 PM

Hello all, 

 

I have a new client as a result of them coming in contact with crypto (not sure which version). Prior to calling us the PC that had the decrypt instructions on it was put through a system restore. The PC was logged into and everything seemed ok. This particular PC has hardly any data on it, just an app that is their entire world with a share to the server where all the data lies. So the app they use is not making the connection to the server and it seems as if there are files that are encrypted. Many with different file exntension ive never seen nor heard of. 

 

My question is now that they have restored the PC is it still possible to do the tor download and get this decrypted as there is no backup of that server and they need everything in there. I dont want to go through the motions to find out it cannot make the connection. They printed out a copy of the instructions (HELP_YOUR_FILES.html) before restoring it so i still have the unique address to put into the tor browser. 

 

Any direction would be terrific, thanks.

 

edit: Its a cryptowall varient.


Edited by Tangy4, 03 December 2015 - 04:13 PM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 52,098 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:44 PM

Posted 04 December 2015 - 04:56 PM

CryptoWall 4.0 leaves ransom notes named HELP_YOUR_FILES.TXT, HELP_YOUR_FILES.HTML and HELP_YOUR_FILES.PNG and will encrypt the actual filename of an encrypted file as well as the data contained in it. Each encrypted file will have a unique name with random characters (0ausbffwh.p5, 72lcvn.iv6nn, x83o8x.ux7, etc).

A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0, CryptoWall 3.0 & CryptoWall 4.0 is provided by Grinler (aka Lawrence Abrams), in this topic: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

More information in this BC news article...Cryptowall typically deletes (though not always) all Shadow Volume Copies with vssadmin.exe so that you cannot restore your files via System Restore, native Windows Previous Versions or using a program like Shadow Explorer...but it never hurts to try in case the infection did not do what it was supposed to do. Another possible option is to try file recovery software such as R-Studio or Photorec to recover some of your original files but there is no guarantee that will work.

Unfortunately at this time there is no fix tool and decryption of CryptoWall files...is impossible since there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom. For a more detailed explanation, read this reply by Nathan (DecrypterFixer). The only other alternative is to save your data as is and wait for a possible breakthrough...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a possible solution so save the encrypted data and wait until that time.

There is an ongoing discussion in this topic where you can ask questions and seek further assistance.Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users