Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Indentify .id{number}_emai1_filesok@protonmail.com_email2_sos@aesencryption.info


  • Please log in to reply
3 replies to this topic

#1 Staf77

Staf77

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 28 September 2016 - 05:32 AM

Windows 7 PC infected by unknown ransomware changing extension to

 

.id-8434494476_emai1_filesok@protonmail.com_email2_sos@aesencryption.info

 

It encrypted JPG files and others but I can't verify right now

 

desktop background is set with sos@aesencryption.info image

 

I haven't find instruction file

 

I cleaned up the PC with Anvi Rescue disk 1.1 that find some trojans.

Unfortunately it doesn't create a log file and I don't remember any name....

(I know, it's my mistake, but I can't realizing how it's possible it doesn't create a log file!)

 

I'm trying various ransomware removal tools but no luck for now.

 

I tried to simply restore original file name but the files appear to be really encrypted....

 

Someone have suggestions?

 

thanks in advance for any help

 



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,939 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:49 AM

Posted 28 September 2016 - 06:09 AM

More information is needed to determine specifically what infection you are dealing with since there are many variants of crypto malware ransomware.

Did you find any ransom notes? These infections are created to alert victims that their data has been encrypted and demand a ransom payment. Check your documents folder for an image the malware typically uses for the background note. Check the C:\ProgramData (or C:\Documents and Settings\All Users\Application Data) for a randomly named .html, .txt, .png, .bmp, .url file. Most ransomware will also drop a ransom note in every directory/affected folder where data was encrypted.

You can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation. This is a service that helps identify what ransomware may have encrypted your files and then attempts to direct you to an appropriate support topic where you can seek further assistance. Uploading both encrypted files and ransom notes together provides a more positive match and helps to avoid false detections. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 to manually inspect the files.

Example screenshot:
2016-07-01_0936.png
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Staf77

Staf77
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 28 September 2016 - 04:37 PM

Thank you quietman7,

I've submitted different files types to ID Ransomware and they haven't been identified.

The SHA1 cases are d8159b2a9bef825676588ae6e16e9fc58ec18d6f - dd7980e12f9e991f4ce9132cdbfba08497a03104 - 1723ca7838d1566a3c003b42de7ccf6f51a60656

 

Meanwhile I found the quarantine folder of anvi rescue disk in C:\$Anvi Rescue Disk$

and the software found these malwares: Trojan.Inject.EZ.an , Trojan.Srizbi  and Malware.Generic

 

Another clue, the encrypted files extensions are DOC, DOCX, JPG, MOV, PDF, ZIP

not affected GIF, HTM, MP3, MP4, PNG
 
I didn't find ransom note, I found only the lock.bmp image set as desktop background on which featured sos@aesencryption.info
 
thanks


#4 Staf77

Staf77
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 29 September 2016 - 02:41 PM

Update.

 

I have tried tools from Kaspersky and Trend Micro.

The only one doing something is Kaspersky's Rakhnidecryptor that says:

 

0x0544  Current state: 9175 / 1000000
0x1604  Password recovered
0x1604  ProcessDriveEnumEx: Drive C:\ type 3:0
 
and starting decripting JPG files.
 
Unfortunately neither the default Windows image viewer nor Corel Paint Shop Pro X2 are able to open the image.
I stopped the decryption process without processing other types of files....





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users