Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Need help for recovering crypted files

  • This topic is locked This topic is locked
1 reply to this topic

#1 Pauldb


  • Members
  • 2 posts
  • Local time:05:58 PM

Posted 18 April 2017 - 04:45 AM


Our company's important files have been hacked by the Ransomware AES-NI.

This is what is detected by ID-RANSOMWARE:


  • ransomnote_filename: !!! READ THIS - IMPORTANT !!!.txt
  • ransomnote_email: aes-ni@scryptmail.com
  • ransomnote_bitmessage: BM-2cVgoJS8HPMkjzgDMVNAGg5TG3bb1TcfhN
  • sample_extension: .aes_ni_0day

We contacted the ransomner by email. We got few response and then he gave us a bitcoin address to send the money to.


I saw you wrote in these forums these last days, so you've been active.

GUY you seemed sincere when you said you would help us decrypt the files. In our email exchanges I felt trust.

Now our entire company depends on getting those files back (encrypted MSSQL databases that are VITAL to our business).

We paid the ransom and haven't heard from you since then.


I've been in contact with you through this email address: 0xc030@protonmail.ch.


Please do your part of the agreement. I don't believe you're a BLACK HAT, neither a WHITE HAT.

But I do believe you want to make a point with the trade-off the NSA is making when they want to put backdoors and bleep in software and hardware.

I understand. But now point is made. We need the be back on track and live as soon as possible or a lot of people in our little company might lose their job because of this.


Please be a GREY HAT, making a point, a costly point, but being fair with values and giving us the tools to decrypt you said you would give.


In much hope,


A young developer from this company you hacked.




===============================# aes-ni ransomware #===============================

                   █████╗ ███████╗███████╗      ███╗   ██╗██╗
                  ██╔══██╗██╔════╝██╔════╝      ████╗  ██║██║
                  ███████║█████╗  ███████╗█████╗██╔██╗ ██║██║
                  ██╔══██║██╔══╝  ╚════██║╚════╝██║╚██╗██║██║
                  ██║  ██║███████╗███████║      ██║ ╚████║██║
                  ╚═╝  ╚═╝╚══════╝╚══════╝      ╚═╝  ╚═══╝╚═╝
INTRO: If you are reading it, your server was attacked with NSA exploits.
Make World Safe Again.
SORRY! Your files are encrypted.
File contents are encrypted with random key (AES-256 bit; ECB mode).
Random key is encrypted with RSA public key (2048 bit).
We STRONGLY RECOMMEND you NOT to use any "decryption tools".
These tools can damage your data, making recover IMPOSSIBLE.
Also we recommend you not to contact data recovery companies.
They will just contact us, buy the key and sell it to you at a higher price.
If you want to decrypt your files, you have to get RSA private key.
In order to get private key, write here:
IMPORTANT: In some cases malware researchers can block our e-mails.
If you did not receive any answer on e-mail in 48 hours,
 please do not panic and write to BitMsg (https://bitmsg.me) address:
 or create topic on https://www.bleepingcomputer.com/ and we will find you there.
If someone else offers you files restoring, ask him for test decryption.
 Only we can successfully decrypt your files; knowing this can protect you from fraud.
You will receive instructions of what to do next.
You MUST refer this ID in your message:
Also you MUST send all ".key.aes_ni_0day" files from C:\ProgramData if there are any.
===============================# aes-ni ransomware #===============================


BC AdBot (Login to Remove)



#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 50,715 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:58 AM

Posted 18 April 2017 - 05:39 AM

Unfortunately, there is no known way to decrypt files encrypted by AES Ransomware without paying the ransom.

There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users