Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

A way to decrypt .block ransomware


  • This topic is locked This topic is locked
4 replies to this topic

#1 xoreutis

xoreutis

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:09 PM

Posted 27 September 2017 - 08:35 AM

Hello

 

My friend's server had been attacked by a ransomware which has this format "29112010.xls.id-1C256E56.[decrypt.guarantee@aol.com] (1).block" has anyone any idea what type of ransomware is and if there is any decryption?

 

Thanks a lot



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 52,073 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:09 PM

Posted 27 September 2017 - 03:44 PM

...My friend's server had been attacked by a ransomware which has this format "29112010.xls.id-1C256E56.[decrypt.guarantee@aol.com] (1).block" has anyone any idea what type of ransomware is and if there is any decryption?...

Did you find any ransom notes and if so, what is the actual name of the note?
Did the cyber-criminals provide an email address to send payment to? If so, what is the email address?

The best way to identify the different ransomwares is the ransom note (including it's name), samples of the encrypted files, any obvious extensions appended to the encrypted files, information related to any email addresses used by the cyber-criminals to request payment and the malware file responsible for the infection.

You can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation. This is a service that helps identify what ransomware may have encrypted your files and then attempts to direct you to an appropriate support topic where you can seek further assistance. Uploading both encrypted files and ransom notes together provides a more positive match and helps to avoid false detections. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 to manually inspect the files.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,590 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:09 PM

Posted 28 September 2017 - 10:44 AM

It is Unlock92 2.0, which is not decryptable.

 

If you uploaded that filename, it may have confused ID Ransomware since it was a duplicate file with " (1)" in it. Uploading a file without that duplicate marker would identify properly.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#4 xoreutis

xoreutis
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:09 PM

Posted 28 September 2017 - 12:25 PM

It is Unlock92 2.0, which is not decryptable.

 

If you uploaded that filename, it may have confused ID Ransomware since it was a duplicate file with " (1)" in it. Uploading a file without that duplicate marker would identify properly.

 

You are right! It is unlock92 2.0. 

Below there is a file you can inspect!

https://www.sendspace.com/file/f8k39x

 

My friend contact to someone who had encrypted his files with wannacry and he told this...

 

 


How can i trust you if i pay before you do it? Before 3 weeks one of my customer pay you for the wannacry you send. 0.12 btc. So the price still the same? 

Στις 27 Σεπ 2017 9:16 μ.μ., ο χρήστης  έγραψε:

 

I can decrypt your server, only it will occupy 4 working hours me. I cannot spend so much time, on you without knowing, you pay or not.

 

Yes, I understand you. Therefore I suggest to act this way. 
A half of the sum at once, the second half after interpretation of files. That I didn't spend time for nothing. Within 4-6 hours, I will be able to make the decoder.

 

Do you think there would be any chance?


Edited by xoreutis, 28 September 2017 - 12:48 PM.


#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 52,073 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:09 PM

Posted 28 September 2017 - 03:45 PM

Bleeping Computer cannot vouch for those who claim they can decrypt data. We are a large site and have no way of knowing the background, expertise or motives of individuals who indicate decryption is possible. We can only advise to be cautious with whomever you are dealing with, what services they are able to provide and what claims they make before sending money to anyone.

Since the infection has been identified, rather than have everyone with individual topics, it would be best (and more manageable for staff) if victims posted any more questions, comments or requests for assistance in the below support topic discussion.To avoid unnecessary confusion, this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users