Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Pliki .opp .sss


  • Please log in to reply
4 replies to this topic

#1 burek

burek

  • Members
  • 3 posts
  • OFFLINE
  •  

Posted 07 November 2017 - 07:38 AM

Is there a way to decrypt these files?

https://www.sendspace.com/filegroup/Y%2BjwtqkD1qv%2BEWUamAOC2w



BC AdBot (Login to Remove)

 


m

#2 Amigo-A

Amigo-A

  • Members
  • 220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3st station from Sun
  • Local time:07:48 AM

Posted 07 November 2017 - 09:08 AM

To increase the chances of decryption, need to perform the following ...
First steps when dealing with Ransomware:

Need info about Crypto-Ransomware? A huge safe base here!

Digest about Crypto-Ransomwares (In Russian) + Google Translate Technology

Anti-Ransomware Project  (In Russian) + Google Translate Technology and links


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 49,905 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:48 PM

Posted 07 November 2017 - 05:58 PM

More information is needed to determine specifically what infection you are dealing with since there are many variants of crypto malware (file encrypting ransomware).

Did you find any ransom notes and if so, what is the actual name of the note?
Did the cyber-criminals provide an email address to send payment to? If so, what is the email address?

The best way to identify the different ransomwares is the ransom note (including it's name), samples of the encrypted files, any obvious extensions appended to the encrypted files, information related to any email addresses used by the cyber-criminals to request payment and the malware file responsible for the infection.

As noted by Amigo-A, you can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation. This is a service that helps identify what ransomware may have encrypted your files and then attempts to direct you to an appropriate support topic where you can seek further assistance. Uploading both encrypted files and ransom notes together provides a more positive match and helps to avoid false detections. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 to manually inspect the files.
.
.
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Microsoft MVP Reconnect 2016
Windows Insider MVP 2017
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 burek

burek
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  

Posted 08 November 2017 - 02:53 AM

please
ATTENTION!
 
All your files are encrypted with cryptographically strong algorithm, and without original decryption key recovery is impossible.
 
To get your unique key and decode files, you need to write us at email written below during 72 hours, otherwise your files will be destroyed forever!
 
aversia@tuta.io

Edited by burek, 08 November 2017 - 03:16 AM.


#5 Amigo-A

Amigo-A

  • Members
  • 220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3st station from Sun
  • Local time:07:48 AM

Posted 08 November 2017 - 11:45 AM

aversia@tuta.io

 

 

Just looking at the files, can say that 
1) email aversia@tuta.io has recently been used in BTCWare-PayDay Ransomware
2) your files after encryption has a compound extension, as it was after the attack of Cryakl Ransomware, only then the file name ends with a .cbf extension
 
2) => may help RannohDecryptor, but this is not a fact
 
Try, but it by first making a copy of the test files. 

Edited by Amigo-A, 08 November 2017 - 11:52 AM.

Need info about Crypto-Ransomware? A huge safe base here!

Digest about Crypto-Ransomwares (In Russian) + Google Translate Technology

Anti-Ransomware Project  (In Russian) + Google Translate Technology and links





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users