Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

My files encrypted with .BTC extension


  • Please log in to reply
8 replies to this topic

#1 iqsystems

iqsystems

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:56 PM

Posted 27 October 2017 - 11:03 AM

Hi, 2 days ago my PC running win10 pro was attacted by ransomware and all my files .exe etc. and mssql databases were encrypted with a .btc extension. It also encrypted by external hdd with all my sql backups (.bak)

 

Any ideas???

 

Thank you.

 



BC AdBot (Login to Remove)

 


#2 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:56 PM

Posted 27 October 2017 - 11:37 AM

I saw some submissions of this come through ID Ransomware lately. We'll need the malware itself to analyze and properly identify whether it is new, or just a new variant of an existing family.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#3 iqsystems

iqsystems
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:56 PM

Posted 27 October 2017 - 11:56 AM

Thanks for the reply

 

I uploaded 2 files on ID Ransomware, the instructions and an encrypted file

 

I hope you can help me since all backups of my data bases are on an external hdd that was also infected

 

Thanks again!!!



#4 DavisMcCarn

DavisMcCarn

  • Members
  • 895 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:56 PM

Posted 27 October 2017 - 11:59 AM

The fact that the ransomware encrypted your SQL files strongly suggests it is a new variant rather than an older one resurfacing.  The original BTC did not encrypt those files.

Further, there does not seem to be a decryption tool for even the 2016 flavors of BTC.

Your best hope, I think, is to try ShadowExplorer and pray.  You can get it from the downloads section here.


The fact that the ransomware encrypted your SQL files strongly suggests it is a new variant rather than an older one resurfacing.  The original BTC did not encrypt those files.

Further, there does not seem to be a decryption tool for even the 2016 flavors of BTC.

Your best hope, I think, is to try ShadowExplorer and pray.  You can get it from the downloads section here.


Computer dinosaur, servicing PC's since 1976

#5 iqsystems

iqsystems
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:56 PM

Posted 27 October 2017 - 12:06 PM

Thank you

 

I used ShadowExplorer but it is impossible for mssql to bring the database online.   It is badly corrapted and it keeps telling me "it is not a primary database"



#6 iqsystems

iqsystems
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:08:56 PM

Posted 27 October 2017 - 12:12 PM

I downloaded JigsawDecrypter but no luck either.



#7 DavisMcCarn

DavisMcCarn

  • Members
  • 895 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:56 PM

Posted 27 October 2017 - 03:23 PM

Did you try every possible copy and backup copy of the database?
If you have and none of them work, you're sunk. The 2017 flavors of ransomware use a 2048 bit encryption key and the estimates are that a fast PC might figure it out in about 17,000 years. They also go after Quicken, QuickBooks, SQL, and a whole lot of other files that older versions didn't.
Computer dinosaur, servicing PC's since 1976

#8 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:56 PM

Posted 27 October 2017 - 04:16 PM

Did you try every possible copy and backup copy of the database?
If you have and none of them work, you're sunk. The 2017 flavors of ransomware use a 2048 bit encryption key and the estimates are that a fast PC might figure it out in about 17,000 years. They also go after Quicken, QuickBooks, SQL, and a whole lot of other files that older versions didn't.

 

This isn't BTCWare, so we don't know what encryption routine it actually uses. We still need to see a sample of the malware, but I can 100% confirm it isn't a BTCWare variant based on several things such as the note, format of the encrypted file, and my detection rules.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,768 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:56 PM

Posted 27 October 2017 - 06:46 PM

Samples of suspicious executable's (installer, malicious files, attachments) that you suspect were involved in causing the infection can be submitted (uploaded) here with a link to this topic. There is a "Link to topic where this file was requested" box under the Browse button...it's best to compress large files before sharing.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users