Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HELP_DECRYPT .41FEB EXTENSION TO FILES


  • This topic is locked This topic is locked
1 reply to this topic

#1 cxin

cxin

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:09:48 AM

Posted 29 June 2016 - 10:38 PM

Hi

 

Got my files encrypted on 6/22/2016. All file names were preserved, but with a .41FEB added . The ransom note says the files  were encrypted by strong RSA 4096  and directed me to pay ransom at www.torproject.org .  Are these the same people who said they closed project on May 18, 2016 and disclosed the master key ? Is this variant .41FEB  decryptable at this point ?  I've read through hundreds of posts and there seemed no mentioning of this variant before.  Please help

 

Thanks in advance  



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,769 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:48 AM

Posted 30 June 2016 - 05:15 AM

Any files that are encrypted with CryptXXX 3.x (UltraDeCrypter/UltraCrypter) will have the .cryp1, .crypz or a random 5 hexadecimal character extension (i.e. .AC0D4, .DA3D1, .73E61, .EF538) appended to the end of the encrypted data filename as explained here.

CryptXXX 2.x/3.x variants will leave unique Personal ID files using random 12 hexadecimal characters with names like <id-number>.html, <id-number>.txt, <id-number>.bmp (i.e. S45CC72F3463.txt, !4AD604B8AE89.txt), !Recovery_<id-number>.html, !Recovery_<id-number>.txt, !Recovery_<id-number>.bmp (i.e. !Recovery_4582C8FAEB15.txt). The newest version of CryptXXX 3.x will have ransom notes with names like @[id-number].txt, @[id-number].bmp, @[id-number].html (i.e. 14AC2EF20B23.txt).

A repository of all current knowledge regarding CryptXXX is provided by Grinler (aka Lawrence Abrams), in this topic: CryptXXX Ransomware Help, Information Guide and FAQ.
There is an ongoing discussion in this topic where you can ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion, this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users