Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

wallet blackrangers@asia.com


  • This topic is locked This topic is locked
3 replies to this topic

#1 elmuerto77

elmuerto77

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 12 June 2017 - 05:27 AM

I have searched for information about this ransomware that has infected my computer, it is an extension .wallet and this is the address that I added to my files [blackrangers@asia.com] .wallet.

I have tried with decryptores from avast, kaspersky, eset, and several others and none solves.

In rasonware ID does not determine it, and gives me this reference, so I can start this topic

SHA1: 205dfcadc58b185f20c5422bcaad4eab17f28218

some help?

Edited by hamluis, 12 June 2017 - 06:55 AM.
Moved from Introductions to Ransomware - Hamluis.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,486 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:36 PM

Posted 12 June 2017 - 03:37 PM

The [email].wallet extension is commonly seen with Dharma ransomware.

Did you find any ransom notes and if so, what is the actual name of the note?

Did you upload both encrypted files and ransom notes together to ID Ransomware? Doing that provides a more positive match and helps to avoid false detections.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 elmuerto77

elmuerto77
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:36 PM

Posted 12 June 2017 - 07:41 PM

I uploaded more files, and he gave me the following information,

Dharma (.wallet)
 This ransomware is decryptable!
Identified by

Sample_extension:. [<Email>] wallet
Click here for more information about Dharma (.wallet)

 

But, as I mentioned, no software worked to decrypt.

We have not yet found which computer the virus was installed on. That's why we do not have the file note. What we have is a server with shared files, and these files are encrypted.

In this topic https://www.bleepingcomputer.com/news/security/wallet-ransomware-master-keys-released-on-bleepingcomputer-avast-releases-free-decryptor/
Gives a contained file to Pastebin link, but I do not know how to use it, I also do not find a tutorial in the forum

 

sorry my english



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,486 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:36 PM

Posted 12 June 2017 - 08:02 PM

There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users