Jump to content
Posted 06 December 2015 - 08:06 AM
Posted 06 December 2015 - 08:51 AM
HELP_DECRYPT.TXT, HELP_YOUR_FILES.TXT, HELP_TO_DECRYPT_YOUR_FILES.txt, HELP_RESTORE_FILES.txt HELP_TO_SAVE_FILES.txt, RECOVERY_KEY.txt, DecryptAllFiles.txt, DECRYPT_INSTRUCTION.TXT HOW_TO_DECRYPT_FILES.txt, How_To_Recover_Files.txt, encryptor_raas_readme_liesmich.txt About_Files.txt, DecryptAllFiles_<user name>.txt, ReadDecryptFilesHere.txt, RECOVERY_FILES.txt HOWTO_RESTORE_FILES_*****.txt, DecryptAllFiles_*******.txt (where * are 6-7 random characters) RECOVERY_FILE_*****.txt, restore_files_*****.txt (where * are random characters) howto_recover_file_*****.txt, _how_recover_*****.txt (where * are random characters) how_recover+jav.txt, recover_file_*****.txt, (where * are random characters)Once you have identified which particular ransomware you are dealing with, I can direct you to the appropriate discussion topic for further assistance.
Posted 06 December 2015 - 12:45 PM
Posted 06 December 2015 - 04:13 PM
UPDATE: Unfortunately the Kasperski Rakhni Tool has returned no result. I'm a little bit scared considering the fact that the attacker said something about a deadline of 72 hours. I hope the data isn't lost forever... I'll take a look for a ransom text document tommorrow, at college.
Posted 06 December 2015 - 05:07 PM
Posted 07 December 2015 - 02:11 PM
Thank you for your reply. My only question is this: After I submit a sample or more of the corrupted data, what is there to be done after? Thanks in advance for your efforts, BC Team.
Posted 07 December 2015 - 05:54 PM
0 members, 0 guests, 0 anonymous users