Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rush (.crashed) Ransomware Help & Support Topic - DECRYPT_YOUR_FILES.HTML


  • This topic is locked This topic is locked
No replies to this topic

#1 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,268 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:21 PM

Posted 23 July 2016 - 10:00 AM

The Rush Ransomware is a sanction variant that will encrypt data on all the local drives on a computer. When it encrypts data it will use AES encryption and then append the .crashed extension to encrypted files. In each folder it encrypts files it will create a ransom note called DECRYPT_YOUR_FILES.HTML.

The ransom amount is 2 bitcoins and the associated bitcoin address is 1MNXvRYn32EdGqq2YsqQ1hAEBU3NRcPN7h. Victims are told to email unransom@me.com after making payment to get the decryptor.

At this time there is no way to decrypt files encrypted by the Rush Ransomware.

The files targeted by Rush Ransomware are:
 

.txt, .qbb, .pdf, .msg, .asmx, .rpt, .arw, .sldprt, .dwf, .doc, .adi, .adt, .docx, .altr, .xls, .xlsx, .ppt, .pptx, .odt, .jpg, .png, .csv, .sql, sln, .php, .asp, .aspx, .html, .xml, .psd

As this is a Sanction variant, please use the Sanction topic instead for support: Sanction Ransomware Help & Support Topic.


 

ransom-note.png


Edited by xXToffeeXx, 23 July 2016 - 10:11 AM.


BC AdBot (Login to Remove)

 


m



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users