Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Script to remove encrypted / related Crptowall files


  • This topic is locked This topic is locked
1 reply to this topic

#1 norman1nz

norman1nz

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:20 PM

Posted 14 February 2016 - 05:04 PM

Hi there.

We have a PC that was infected by Cryptowall and we're not paying the ransom.

We need to tidy the affected files and notice these all have a modified date of when infected.

 

Hence a script would work well to move/copy all these to another folder would be an easy way to tidy it for myself and other future users.

(this ransomware version didn't rename the files so we could consolidate / have a record of which files were encrypted - this also may be useful for people in future determining whether it's worth paying the ransom or if, like in this instance, they suspect the data isn't so important).

 

Does anyone have one of these already?

 

I'm thinking something along these lines:

http://stackoverflow.com/questions/21882831/how-to-compare-two-dates-in-powershell-get-difference-in-minutes

http://stackoverflow.com/questions/19774097/powershell-script-for-finding-modified-date-of-a-file-folder

 



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,386 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:20 AM

Posted 14 February 2016 - 06:38 PM

There are several variants of Cryptowall. The original CryptoWall leaves files (ransom notes) with names like DECRYPT_INSTRUCTION.TXT, DECRYPT_INSTRUCTION.HTML, and DECRYPT_INSTRUCTION.URL. CryptoWall 2.0 leaves ransom notes named install_tor.url. CryptoWall 3.0 leaves ransom notes named HELP_DECRYPT.TXT, HELP_DECRYPT.HTML, and HELP_DECRYPT.PNG but does not change the file extension of the file it encrypts. CryptoWall 4.0 leaves ransom notes named HELP_YOUR_FILES.TXT, HELP_YOUR_FILES.HTML and HELP_YOUR_FILES.PNG. CryptoWall 4.0 also will encrypt the actual filename of an encrypted file as well as the data contained in it. Each encrypted file will have a unique name with random characters (0ausbffwh.p5, 72lcvn.iv6nn, x83o8x.ux7, etc). More information in this BC news article...A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0, CryptoWall 3.0 & CryptoWall 4.0 is provided by Grinler (aka Lawrence Abrams), in this topic: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

There are ongoing discussions in these topics where you can ask questions and seek further assistance for the CryptoWall variant you are dealing with.Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in the topic discussion related to the variant you are dealing with. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users