Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


HiddenTear 2.0 Help & Support Topic (.isis / README.TXT)

  • Please log in to reply
No replies to this topic

#1 Demonslay335


    Ransomware Hunter

  • Security Colleague
  • 3,579 posts
  • Gender:Male
  • Location:USA
  • Local time:06:18 PM

Posted 26 June 2016 - 11:18 AM

A supposedly "educational" version of HiddenTear has been found in the wild, discovered by security researcher Jakub Kroustek and dubbed as potential "educrypt", calls itself "HiddenTear 2.0".


The malware may come from a download on the internet, and has a very crude Skype logo for the icon, along with the filename "skypetool.exe".




Victim's files are encrypted using AES with a randomly generated password, and have the extension ".isis" appended. The ransom note is left on the desktop called "README.txt", and has the following message.



Well hello there, seems you have a virus! Well you are going to get the decryptor which is here http://www.filedropper.com/decrypter_1 Don't Download Random bleep On The Internet A Hidden .txt File Has Been Created With The Decrypt Password! Find It!..


Fortunately, this ransomware is true to its claim, and is easily decrypted. The password will be saved to a file under My Documents called "DecryptPassword.txt".



Smart Find! Password: XXXXX-XXXXX-XXXXX


While the decrypter provided is confirmed to be non-malicious, it only searches for files by the extension ".locked", as was the original HiddenTear project.


I have updated my decrypter to be used with this variant. Simply download the decrypter at this link, and input the password from the "DecryptPassword.txt" file. I recommend running it on a test directory before trying to decrypt all files.




logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.

BC AdBot (Login to Remove)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users