Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

AES-NI Ransomware (.aes256, .aes_ni, !!Read This_Important!!.txt) Support Topic


  • Please log in to reply
227 replies to this topic

#1 atul1201

atul1201

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:57 AM

Posted 16 December 2016 - 05:49 PM

We have been infected by a variant that has reanamed all our files .aes256.  Please help!

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 48,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:57 AM

Posted 16 December 2016 - 06:47 PM

You have also posted in this support topic...do you know for sure what ransomware you are dealing with?

If not, you can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation. This is a service that helps identify what ransomware may have encrypted your files and then attempts to direct you to an appropriate support topic where you can seek further assistance. Uploading both encrypted files and ransom notes together provides a more positive match and helps to avoid false detections.
.
.
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Microsoft MVP Reconnect 2016
Windows Insider MVP 2017
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 2,995 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:03:57 AM

Posted 17 December 2016 - 01:27 AM

We have been infected by a variant that has reanamed all our files .aes256.  Please help!

 

How do you know it is a variant of anything in particular when you've posted in 2 different topics?

 

I've seen that extension and a related ransom note come through a few times on ID Ransomware, but have not found any information on it at all.

 

Do you have a sample of the malware or know how you got it? That would be the most useful thing at this point in order to analyze it.

 

Here is the contents of the ransom note. Might be worth splitting to a new topic until it is identified, and whether it is identified as a new variant of an existing family, or something completely new.

<<<<<<<<<<<<<<<<<<<< YOUR FILES ARE ENCRYPTED! >>>>>>>>>>>>>>>>>>>>
 
SORRY! All personal files on your computer are encrypted.
File contents are encrypted with random key (AES-256; ECB mode).
Random key is encrypted with RSA public key (2048 bit).
 
We STRONGLY RECOMMEND you NOT to use any "decryption tools".
These tools can damage your data, making recover IMPOSSIBLE.
 
If you want to decrypt your files, you have to get RSA private key.
In order to get private key, write here:
 
aes-ni@protonmail.com
aes-ni@tuta.io
 
Also you can write to BitMsg (https://bitmsg.me) address
  if you did not receive any answer on e-mail:
 
BM-2cVgoJS8HPMkjzgDMVNAGg5TG3bb1TcfhN
 
You will receive instructions of what to do next.
You MUST refer this ID in your message:
 
[redacted]
 
<<<<<<<<<<<<<<<<<<<< YOUR FILES ARE ENCRYPTED! >>>>>>>>>>>>>>>>>>>>

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#4 thyrex

thyrex

  • Members
  • 432 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:11:57 AM

Posted 17 December 2016 - 03:30 AM

We have been infected by a variant that has reanamed all our files .aes256.  Please help!

Can you upload some encrypted files on https://www.sendspace.com and give us downloading link?


Microsoft MVP 2012, 2013, 2014, 2015, 2016 Consumer Security


#5 DXXD_

DXXD_

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Ukraine
  • Local time:04:57 AM

Posted 17 December 2016 - 05:25 AM

hello why u write in my DXXD  topic?

Create a new topic.. its not my programm with .aes256 extensions


Edited by DXXD_, 17 December 2016 - 05:26 AM.


#6 atul1201

atul1201
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:57 AM

Posted 18 December 2016 - 12:33 PM

We were hit with a bad ransomware virus that renamed all of our files with a .aes256 extension.  Has anyone seen this?  Below is the text of the ransomware note as well as I am sending a link to the encrypted file.\

 

https://www.sendspace.com/file/ravxug

 

 

<<<<<<<<<<<<<<<<<<<< YOUR FILES ARE ENCRYPTED! >>>>>>>>>>>>>>>>>>>>
SORRY! All personal files on your computer are encrypted.
File contents are encrypted with random key (AES-256; ECB mode).
Random key is encrypted with RSA public key (2048 bit).
We STRONGLY RECOMMEND you NOT to use any "decryption tools".
These tools can damage your data, making recover IMPOSSIBLE.
If you want to decrypt your files, you have to get RSA private key.
In order to get private key, write here:
aes-ni@protonmail.com
aes-ni@tuta.io
Also you can write to BitMsg (https://bitmsg.me) address
  if you did not receive any answer on e-mail:
BM-2cVgoJS8HPMkjzgDMVNAGg5TG3bb1TcfhN
You will receive instructions of what to do next.
You MUST refer this ID in your message:
<redacted>
<<<<<<<<<<<<<<<<<<<< YOUR FILES ARE ENCRYPTED! >>>>>>>>>>>>>>>>>>>>

 



#7 atul1201

atul1201
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:57 AM

Posted 18 December 2016 - 12:35 PM

I have created a new topic for this per everyone's request.  Any assistance would be great:

 

https://www.bleepingcomputer.com/forums/t/635140/aes256-ransomware/



#8 thyrex

thyrex

  • Members
  • 432 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:11:57 AM

Posted 18 December 2016 - 01:37 PM

Please upload .doc.aes256 or .docx.aes256


Microsoft MVP 2012, 2013, 2014, 2015, 2016 Consumer Security


#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 48,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:57 AM

Posted 18 December 2016 - 02:15 PM

I have split the related postings from the other topic and included them here so everything is in one place.
.
.
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Microsoft MVP Reconnect 2016
Windows Insider MVP 2017
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#10 atul1201

atul1201
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:57 AM

Posted 18 December 2016 - 03:52 PM

I don't seem to have any .doc or .docx files, will an xlsx file work or PDF. We did a lot of post infection cleanup and I can't seem to find a .doc file.

#11 thyrex

thyrex

  • Members
  • 432 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:11:57 AM

Posted 19 December 2016 - 12:15 PM

You can upload jpg.aes256 or pdf.aes256


Microsoft MVP 2012, 2013, 2014, 2015, 2016 Consumer Security


#12 Retsiem

Retsiem

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:57 AM

Posted 19 December 2016 - 05:12 PM

Hello -

 

I just ran into this problem today and have some files that I desperately need to get access to. I have a sample jpg.aes256 file and the !!! READ THIS _ IMPORTANT !!!.txt file I already tried ID Ransomware with no luck. Any help would be greatly appreciated.

 

Apologies if I am posting this in the wrong place.



#13 Retsiem

Retsiem

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:57 AM

Posted 19 December 2016 - 05:14 PM

Here is the link to my file https://www.sendspace.com/file/yjhrjv



#14 Retsiem

Retsiem

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:57 AM

Posted 19 December 2016 - 05:37 PM

This is what I get from ID Ransomware

 

Unable to determine ransomware

please make sure you are uploading a ransom note and encrypted sample file from the same infection

 

etc....

 

Please reference this case SHA1: 9950519394690548012f9da6710626517c342453



#15 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 2,995 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:03:57 AM

Posted 19 December 2016 - 05:57 PM

I have created detection rules for this ransomware on ID Ransomware, and it will point victims to this topic.

 

We still need a sample of the malware itself to analyze. The vector of infection would be useful as well; was it a malicious email, downloaded file, or possibly RDP hack on a server? Any malicious files may be submitted here: http://www.bleepingcomputer.com/submit-malware.php?channel=168

 

We don't need any more samples of ransom notes or encrypted files, ID Ransomware will archive those if submitted.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users