Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ransomware infection - .jpg.encrypted & How_To_Restore_Files.txt


  • This topic is locked This topic is locked
1 reply to this topic

#1 Painer

Painer

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:44 PM

Posted 02 June 2016 - 05:25 PM

This ransomware infection came in an email from AGL (an Australian Gas Company) who we use. My wife didn't know it was a fake and we only got a warning email about it this morning, 2 days after infection.

Each folder has encrypted files and this txt message is included in each folder that contains encrypted files:-

 

 

===============================================================================
            !!! WE HAVE ENCRYPTED YOUR FILES WITH Crypt0L0cker !!!
===============================================================================

Your important files (including those on the network disks, USB, etc): photos,
videos, documents, etc. were encrypted with our Crypt0L0cker. The only way to
get your files back is to pay us. Otherwise, your files will be lost.

You have to pay us if you want to recover your files.

In order to restore the files open our website
http://de2nuvwegoo32oqv.torking.li/aydd85j.php?user_code=1zg3ybi&user_pass=3840
and follow the instructions.

If the website is not available please follow these steps:
1. Download and run TOR-browser from this link: https://www.torproject.org/download/download.html.en
2. After installation run the browser and enter the address: http://de2nuvwegoo32oqv.onion/aydd85j.php?user_code=1zg3ybi&user_pass=3840
3. Follow the instructions on the website.

===============================================================================              


I did a post (uploads) on this site:- ID Ransomware and this is the result:-

2 Results

1. Crypt0L0cker - This ransomware has no known way of decrypting data at this time. (I'm backing all the encrypted files up for future use (hopefully))
      Indentified by
            ransomnote_filename: HOW_TO_RESTORE_FILES.TXT
            sample_extension: .encrypted

2. KeRanger - This ransomware is decryptable!
       Identified by
        sample_extesion: .encrypted
 

Note:- All File Shadow Copies have been disabled.
Note:- Restore Previous Versions have also been disabled
Note:- Windows 8.1

Note:- I did note that .png files are not affected if that is helpful in working out what variant we are stuck with.

 

Can anyone please help?

Cheers



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,945 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:44 PM

Posted 02 June 2016 - 05:43 PM

Any files that are encrypted with Crypt0L0cker (TorrentLocker) will have the .encrypted extension appended to the end of the affected filename. Crypt0L0cker will leave files (ransom notes) with names like DECRYPT_INSTRUCTIONS.TXT, DECRYPT_INSTRUCTIONS.HTML, INSTRUCCIONES_DESCIFRADO.HTML, How_To_Recover_Files.txt, How_To_Restore_Files.txt and HOW_TO_RESTORE_FILES.HTML.

A repository of all current knowledge regarding Crypt0L0cker (TorrentLocker) is provided by Grinler (aka Lawrence Abrams), in this topic: TorrentLocker (fake CryptoLocker) Ransomware Information Guide and FAQ

Unfortunately, decryption of Crypt0L0cker (TorrentLocker)...is not possible since there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom. The only methods you have of restoring your files is from backup, file recovery software, or from Shadow Volume Copies as explained in the FAQ: How to restore files encrypted by TorrentLocker...but there is no guarantee that will work.

However, you may want to read this BC News article: Dr.Web quietly decrypting TorrentLocker for paid customers or distributors.
Updated policy from Dr.Web (11/25/15): Free file decryption assistance only for PCs protected by Dr.Web at the moment of infectionThere is an ongoing discussion in this topic where you can ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion, this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users