Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need help to decrypt my file(s)


  • This topic is locked This topic is locked
3 replies to this topic

#1 Karakurt67

Karakurt67

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:19 AM

Posted 09 April 2016 - 03:23 AM

Hello,

 

I've been recently infected by a RansomWare (RSA 4096), I managed to get rid of it but unfortunately it encrypted all of my personal files; mostly videos and .rar archives.

 

822045RecOveRlbaga.png

 

I tried to decrypt said files myself with TeslaDecoder however I couldn't find the key storage file named key.bat, I'm also unable to tell the extension of the encrypted files as they look unchanged (aka .avi).

 

I have tried my best so far, I've used different programs too such as TeslaCrack/Python/Yafu, Kaspersky's softwares, ShadowExplorer but that one didn't work at all since I had no system backups.

 

Here's an encrypted video: https://www.sendspace.com/file/zj73h3

 

I'm so desperate, please help me!

 

Thanks!

 

'Good day.


Edited by Karakurt67, 09 April 2016 - 03:25 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,613 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:19 AM

Posted 09 April 2016 - 06:36 AM

You can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Karakurt67

Karakurt67
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:19 AM

Posted 09 April 2016 - 06:50 AM

It says I've been blocked! :( Nevermind.

 

What exactly should I submit in Ransom Note?

 

Oh and if it can help, there are also two files in my documents, +recover+file and storage_data.


Edited by Karakurt67, 09 April 2016 - 06:53 AM.


#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,613 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:19 AM

Posted 09 April 2016 - 07:09 AM

TeslaCrypt 4.0 no longer uses an obvious extension for encrypted filenames. TeslaCrypt 4.0 will leave files (ransom notes) with names like RECOVER+[random].TXT, RECOVER[5-random].TXT, recover_file.txt, _rEcOvEr_[5-random].txt, +-HELP-RECOVER-+[5-random]-+.txt, +REcovER+[5-random].txt and {RecOveR}-[5-random]__.txt.

TeslaCrypt 3.0 will have the .xxx, .ttt, .micro or .mp3 extension appended to the end of the affected filename and leave files (ransom notes) with names like recovery_file_[random].txt, recover_file_[random].txt, Howto_Restore_FILES.TXT, help_recover_instructions+[3-random].txt, Recovery+[5-random].txt, _ReCoVeRy_+[5-random].txt, Recovery_[5-random].txt, _H_e_l_p_RECOVER_INSTRUCTIONS+[3-random].txt, _recovery_+cryptolocker.txt, RECOVERY.TXT.

Since you said the files were unchanged, then that sounds like TeslaCrypt 4.0.

Earlier TeslaCrypt variants stored the private key as data files (key.dat, storage.bin} on the local disk as explained here. Currently, there is no way of decrypting TeslaCrypt 3.0 .xxx, .ttt, .micro, .mp3 variants or TeslaCrypt 4.0 unless you pay the ransom since they use a different protection/key exchange algorithm, a different method of key storage and the key for them cannot be recovered. The .xxx, .ttt, micro and .mp3 variants do not have a SharedSecret*PrivateKey so they are not supported by the current version of TeslaViewer. The tool can decrypt TeslaCrypt 3.0/4.0 files only if you have the private key acquired from the malware developer after paying the ransom. If infected with any of these extensions, backup all your encrypted files and wait for a possible solution.
Support for TeslaCrypt 3.0/4.0 is in this topic where you can ask questions and seek further assistance but as noted above there is no solution to fix your encrypted files yet.Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in one of those support topic discussions, particularly the last if dealing with one of the newer variants. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users