Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ransomware - extension .block_file12


  • Please log in to reply
8 replies to this topic

#1 woji

woji

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:58 PM

Posted 11 May 2017 - 02:20 AM

Today, i was encrypted with ".block_file12" ransomware - no ransom note. 
I have exe file used to encrypt - i can upload it.
 
Encrypted files look as: xxxxx.!===contact_mail===itankan12@gmail.com===.block_file12
 
Iam testing decompile EXE and its programmed in .NET 2.0 and code from decompiler is readable - but programming its not my hobby.
 
Here (hxxps://www.sendspace.com/file/bwtsxt) is zipped original and encrypted file + EXE file used to encrypt ( WARNING: exe in archive can encrypt our files - use only at your own risk )

Mod Edit by quietman7: active link disabled.

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,730 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:58 PM

Posted 11 May 2017 - 04:33 AM

Did you submit any samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 woji

woji
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:58 PM

Posted 11 May 2017 - 04:38 AM

Yes, i upload encrypted file but Ransomware ID can not identify ransomware. I did not find a note ransomware anywhere. 



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,730 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:58 PM

Posted 11 May 2017 - 04:48 AM

If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 to manually inspect the files.

Example screenshot:
2016-07-01_0936.png
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 woji

woji
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:58 PM

Posted 11 May 2017 - 04:50 AM

SHA1: bacb1dfbebdb6b7255f696b63910f756c021444b



#6 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,555 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:58 PM

Posted 11 May 2017 - 08:50 AM

I saw other submissions with that extension come through yesterday and set out a hunt. Secured the sample you provided, will take a look at it later to confirm.

 

From other submissions, it looks like it might encrypt it's own ransom note.  :hysterical:

HOW TO DECRYPT FILES.txt!===contact_mail===itankan12@gmail.com===.block_file12

I've created a rule on ID Ransomware to point victims here.


Edited by Demonslay335, 11 May 2017 - 08:51 AM.

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#7 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,555 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:58 PM

Posted 11 May 2017 - 10:41 AM

The sample you provided is just njRAT 0.6.4. Someone must have used it to control your system and run the ransomware.

 

We'll need a sample of the malware to analyze whether it can be decrypted. Try scanning your system with MalwareBytes, HitmanPro, and your antivirus, and checking common places like %APPDATA%, and %TEMP%, and Downloads for anything suspicious.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#8 woji

woji
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:58 PM

Posted 11 May 2017 - 10:54 AM

Thanks for help,man.
System has been scanned and exe file is zipped in archive - download link in my first post

#9 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,555 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:58 PM

Posted 12 May 2017 - 09:13 AM

The link in your first post still gives a zip with 66b83806e81793430bb7514ae2685d52.exe. This file is njRAT, not ransomware. Nothing we can do without the malware that did the encryption.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users