Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

decrypting files from cryptolocker idiots


  • Please log in to reply
10 replies to this topic

#1 rayhanm

rayhanm

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:29 AM

Posted 25 August 2017 - 01:42 PM

I have been struggling to find any solutions to my problem. I was attached by crytolocker and ever since I have been trying to find a solution. I even tried to find the nature of my encrypted file on ID Ransomware, no luck, only got this reference number SHA1: 88d10f648584e52c74d27a60239698f1a90860d9 .

 

Is there any solutions to my problems?

 

Thanks

Rayhan



BC AdBot (Login to Remove)

 


#2 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:29 PM

Posted 25 August 2017 - 02:55 PM

Since there is no filemarker or extension, there's no way to identify without the ransom note or malware itself. If you were hit back in 2013-2014, then it would most likely by the original CryptoLocker, or a clone CryptoWall.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#3 rayhanm

rayhanm
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:29 AM

Posted 25 August 2017 - 03:06 PM

It was in April this year.  Once attacked, I panicked and tried to kill the virus and didn't take notes on the nature or name or anything. Only remember Cryptolocker. 


Edited by rayhanm, 25 August 2017 - 03:08 PM.


#4 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:29 PM

Posted 25 August 2017 - 03:31 PM

The real CryptoLocker was shut down back in 2013; anything since has been a fake one using its name.

 

We still won't be able to identify without a ransom note or the malware. Do you know how you got infected? Email attachment, RDP hack, etc?


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#5 rayhanm

rayhanm
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:29 AM

Posted 25 August 2017 - 03:32 PM

The real CryptoLocker was shut down back in 2013; anything since has been a fake one using its name.

 

We still won't be able to identify without a ransom note or the malware. Do you know how you got infected? Email attachment, RDP hack, etc?

Perhaps by an email attachment 



#6 rayhanm

rayhanm
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:29 AM

Posted 25 August 2017 - 03:34 PM

I am not knowledgeable in this. Is there any way I can post a file for you to check, if you don't mind? 



#7 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:29 PM

Posted 25 August 2017 - 03:35 PM

Malicious files can be submitted here: http://www.bleepingcomputer.com/submit-malware.php?channel=168


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#8 rayhanm

rayhanm
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:29 AM

Posted 25 August 2017 - 03:37 PM

One interesting thing is that my files extensions are not changed. 



#9 rayhanm

rayhanm
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:29 AM

Posted 25 August 2017 - 03:41 PM

Malicious files can be submitted here: http://www.bleepingcomputer.com/submit-malware.php?channel=168

 

Just posted a file



#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,605 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:29 PM

Posted 25 August 2017 - 05:40 PM

One interesting thing is that my files extensions are not changed.

CryptoWall, CrypMic, DMA Locker, Microsoft Decryptor (CryptXXX), PClock, Spora, Cryptofag, TeslaCrypt v4.0, CryptoHost, MotoxLocker, KawaiiLocker, Hermes, LoveServer and Power Worm do not append or change file extensions. The newest variant of Nemucod (Nemucod-AES) and newer variants of Mobef also do not append any extensions to encrypted filenames.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:04:29 PM

Posted 26 August 2017 - 11:48 AM

ID Ransomware is able to pickup on filemarkers for CrypMic, all variants of DMALocker, Spora, TeslaCrypt 4.0, and both versions of Hermes, so those can easily be ruled out in any case like this. Nemucod-AES is easy to spot if only the beginning of the file is encrypted (or has 0 bytes).


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users