Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Crypt0L0cker Clone - Need to decrypt - Plzzzzzz Help


  • This topic is locked This topic is locked
9 replies to this topic

#1 S4MBO

S4MBO

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:58 PM

Posted 12 August 2016 - 04:29 AM

Hi all and thanks in advance for any advise given!

 

I have been hit with a Crypt0L0cker clone by the looks of it and am really hoping to get my files decrypted as this has even encrypted all my important files saved on onedrive and synced them to one drive :/

 

So I will try and provide as much info as possible but if any other info is needed please just ask.

 

FILE INFO

 

Ok so the decryption file is named HOW_TO_RESTORE_FILES.txt and also has a html link called HOW_TO_RESTORE_FILES.html

 

My files have been encrypted with the extension .enc

 

ID RANSOMEWARE INFO

 

After uploading a sample file and ransom note to this site it came back with 3 results Crypt0L0cker, CryptoHasYou & TrueCrypter. Not sure how to narrow it down any further than that sorry.

 

SOURE INFO

 

The name of the file is AUSPOST_parcel.zip

 

This was sent to me as an Australian Post missing parcel phishing email. I can also provide links to the email, download page and/or zip file if that will help anyone identify it further.

 

As a last resort I may pay them if that will get my files back but can I get some advise on whether or not they will unlock them if I pay?

 

 

 



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,905 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:58 AM

Posted 12 August 2016 - 06:33 AM

It is possible you are dealing with two ransomware infections.

Any files that are encrypted with Crypt0L0cker (TorrentLocker) will have the .encrypted extension appended to the end of the encrypted data filename and leave files (ransom notes) with names like DECRYPT_INSTRUCTIONS.TXT, DECRYPT_INSTRUCTIONS.HTML, INSTRUCCIONES_DESCIFRADO.HTML, How_To_Recover_Files.txt, How_To_Restore_Files.txt and HOW_TO_RESTORE_FILES.HTML.

Any files that are encrypted with .Cryptohasyou Ransomware will have the .enc extension appended to the end of the encrypted data filename and leave files (ransom notes) named YOUR_FILES_ARE_LOCKED.txt. When it has finished, it will change your Desktop wallpaper to .cryptohasyou with information about decryption.

Any files that are encrypted with TrueCrypter Ransomware will have the .enc extension appended to the end of the encrypted data filename.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:12:58 AM

Posted 12 August 2016 - 08:37 AM

Please upload the malware attachment here for analysis: http://www.bleepingcomputer.com/submit-malware.php?channel=168

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#4 S4MBO

S4MBO
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:58 PM

Posted 12 August 2016 - 04:01 PM

Please upload the malware attachment here for analysis: http://www.bleepingcomputer.com/submit-malware.php?channel=168

Sorry I don't think I can do that any longer, I deleted the file earlier and now the download link in the email seems to be down or broken :/



#5 S4MBO

S4MBO
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:58 PM

Posted 12 August 2016 - 04:06 PM

It is possible you are dealing with two ransomware infections.

Any files that are encrypted with Crypt0L0cker (TorrentLocker) will have the .encrypted extension appended to the end of the encrypted data filename and leave files (ransom notes) with names like DECRYPT_INSTRUCTIONS.TXT, DECRYPT_INSTRUCTIONS.HTML, INSTRUCCIONES_DESCIFRADO.HTML, How_To_Recover_Files.txt, How_To_Restore_Files.txt and HOW_TO_RESTORE_FILES.HTML.

Any files that are encrypted with .Cryptohasyou Ransomware will have the .enc extension appended to the end of the encrypted data filename and leave files (ransom notes) named YOUR_FILES_ARE_LOCKED.txt. When it has finished, it will change your Desktop wallpaper to .cryptohasyou with information about decryption.

Any files that are encrypted with TrueCrypter Ransomware will have the .enc extension appended to the end of the encrypted data filename.

Seeing as my file names are called "HOW_TO_RESTORE_FILES.txt" and not what is normally the files names for Crypt0L0cker (TorrentLocker) or .Cryptohasyou Ransomware would that point to it being TrueCrypter? Also I didn't have anything change my desktop wall paper.



#6 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:12:58 AM

Posted 12 August 2016 - 05:42 PM

If it came as an email attachment, it isn't TrueCrypter - this was a manual hack where the criminals gain access to the system, and use the legitimate software TrueCrypt to encrypt the files with a password they feed it and keep on their system.

 

I haven't heard of many cases for CryptoHasYou. This could be either something new, or a different variant of Cryp0L0cker (which we should know soon if a ton of victims show up with these same symptoms).

 

Could you share the contents of the ransom note?

 

Unfortunately, we cannot really do anything further without a sample of the malware.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#7 S4MBO

S4MBO
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:58 PM

Posted 12 August 2016 - 09:30 PM

If it came as an email attachment, it isn't TrueCrypter - this was a manual hack where the criminals gain access to the system, and use the legitimate software TrueCrypt to encrypt the files with a password they feed it and keep on their system.

 

I haven't heard of many cases for CryptoHasYou. This could be either something new, or a different variant of Cryp0L0cker (which we should know soon if a ton of victims show up with these same symptoms).

 

Could you share the contents of the ransom note?

 

Unfortunately, we cannot really do anything further without a sample of the malware.

So should I pay them as that's my only option to get data? Or will they just run off with my money anyway and leave me screwed?

 

 

Here's their note:

 

 

===============================================================================
            !!! WE HAVE ENCRYPTED YOUR FILES WITH Crypt0L0cker !!!
===============================================================================

Your important files (including those on the network disks, USB, etc): photos,
videos, documents, etc. were encrypted with our Crypt0L0cker. The only way to
get your files back is to pay us. Otherwise, your files will be lost.

You have to pay us if you want to recover your files.

In order to restore the files open our website
http://vrympoqs5ra34nfo.torview.pl/n6yeapw.php?user_code=1e2jbr0&user_pass=5473
and follow the instructions.

If the website is not available please follow these steps:
1. Download and run TOR-browser from this link: https://www.torproject.org/download/download-easy.html.en
2. After installation run the browser and enter the address: http://vrympoqs5ra34nfo.onion/n6yeapw.php?user_code=1e2jbr0&user_pass=5473
3. Follow the instructions on the website.

===============================================================================   



#8 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:12:58 AM

Posted 13 August 2016 - 02:27 PM

We have confirmed this is the real Crypt0L0cker, it has started to use the extension ".enc". While this ransomware is not decryptable for free, many victims have stated Dr. Web was able to decrypt files for a fee (free if you had their product installed before the encryption). I would recommend contacting them. More information is in the support topic.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#9 S4MBO

S4MBO
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:58 PM

Posted 13 August 2016 - 08:51 PM

 

We have confirmed this is the real Crypt0L0cker, it has started to use the extension ".enc". While this ransomware is not decryptable for free, many victims have stated Dr. Web was able to decrypt files for a fee (free if you had their product installed before the encryption). I would recommend contacting them. More information is in the support topic.

 

Thanks so must for confirming that. I will try Dr Web with a bit of luck might get these decrypted :)



#10 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:06:58 AM

Posted 15 August 2016 - 12:23 PM

Good luck with Dr Web :)

 

Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion, this topic is closed.
 
Thanks
The BC Staff


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users