Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


TeslaCrypt new variant .vvv extension ransomware12-03-2015

  • This topic is locked This topic is locked
1 reply to this topic

#1 KineticConcept


  • Members
  • 3 posts
  • Local time:03:10 AM

Posted 03 December 2015 - 10:18 PM

Hello all,

My network recently got infected with a new variant of the teslacrypt ransomware trojian. I posted here because all topics concerning this matter are archived, and with the recent surge in reported infections across the internet I figured this was the best thing to do.

The infection arrived via email attachment and a user opened the file. The file made it right past symantec endpoint protection. Currently I have not identified the exact email which it arrived within.

Since infection large portions of the network (any network share) has since been encrypted which the user had access to. It did not encrypt everything however, mainly XLSX JPEG TXT and many others, and planting the ransom note everywhere across the computer and network shares. All files have the same original file name but a .vvv added to the end, “file.txt.vvv”. The classic but modified key file has been created recover_file_xxxxxxxxx.txt. Within the file are a few things. A bitcoin address, a 64bit key, 128 bit key, 16 bit key and finally a 2 digit number. Each file which was encrypted has some of the key information in the header of the file.

All recovery tools which I have tried have failed for one reason or another.
BloodyDolly's tool
Cisco Talos
the actual cisco tool found here
and kaspersky link here

I am more then happy to provide any files or other information via private medium so they can be analyzed by respected members here and not posted directly to the web. Also if I have missed anything please notify me of further action to take which might lead to a swift resolution.

Other information:

win7 pro.

infection is localized to one computer.

encryption has spread to many network shares.

Shadow volumes have been removed.

no backups exist.

Thank you very much in advance,


Edited by Chris Cosgrove, 04 December 2015 - 04:54 AM.
Moved from AII to 'General security'

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 52,077 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:10 AM

Posted 04 December 2015 - 05:45 AM

A repository of all current knowledge regarding TeslaCrypt, Alpha Crypt and newer variants is provided by Grinler (aka Lawrence Abrams), in this topic: TeslaCrypt and Alpha Crypt Ransomware Information Guide and FAQ

More information in this BC news article: New TeslaCrypt version adds .VVV extension to encrypted filenames

There is an ongoing discussion in this topic where you can ask questions and seek further assistance.Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users