Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

New Ransomware?


  • Please log in to reply
6 replies to this topic

#1 elvirko

elvirko

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:56 PM

Posted 12 December 2017 - 02:17 PM

Case : a976b34529b5a15b8584b6c5acbb745f742824c1 SHA1

 

contact email of the ransomware: nanopound@scryptmail.com

 

sample : 

               https://ufile.io/8mw4w - encrypted file (after ransomware)

 

t55iqpxrRg2UbciASW63JA.png

https://pastebin.com/ZZjFKx7q -  'HOW TO DECRYPT FILES.txt'



BC AdBot (Login to Remove)

 


#2 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,426 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:56 PM

Posted 12 December 2017 - 02:28 PM

Looks like Xorist, may just be a different case of the extension (usually see that extension with all lowercase).

 

Try the Emsisoft Xorist Decrypter using an encrypted file and its original.

 

https://decrypter.emsisoft.com/xorist


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#3 elvirko

elvirko
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:56 PM

Posted 12 December 2017 - 02:40 PM

Looks like Xorist, may just be a different case of the extension (usually see that extension with all lowercase).

 

Try the Emsisoft Xorist Decrypter using an encrypted file and its original.

 

https://decrypter.emsisoft.com/xorist

Already have, it's not Xorist. 
It got the name from the name of the Note' HOW TO DECRYPT FILES.txt' but I guess this one just shares the same name with that one. 
Xorist = Doesn't work .

 

I also ran 360 ransomware decryption tools and it gave me a link to this post : Screenshot of folders encrypted.TeXyNFl.png

Here's a picture of the extensions  and unknown file. z1yF7iinRY_gHv-lIGOvRA.png


Edited by elvirko, 12 December 2017 - 02:51 PM.


#4 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,426 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:56 PM

Posted 12 December 2017 - 04:38 PM

You have multiple ransomwares that hit. Not sure which hit first, as it seems they each encrypted each other's files, but the system was hit by both Xorist and Locky (.zepto extension). The Locky layer won't be decryptable, and is probably why the Xorist decrypter isn't working, as you would have another layer in-between.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,937 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:56 PM

Posted 12 December 2017 - 05:10 PM

A repository of all current knowledge regarding Locky Ransomware is provided by Grinler (aka Lawrence Abrams), in the: Locky Ransomware Information, Help Guide, and FAQ.

There is an ongoing discussion in the below topic where victims can post comments, ask questions and seek further assistance but as noted by Demonslay335...there is still no known method at this time to decrypt files encrypted by any Locky variants regardless of the extension without paying the ransom.If possible, your best option is to restore from backups, try file recovery software or backup/save your encrypted data as is and wait for a possible solution at a later time...see this Locky Ransomware FAQ.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 elvirko

elvirko
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:56 PM

Posted 12 December 2017 - 06:22 PM

Thank you, both for the responses you have provided. 

No backups were kept, I did hope that there was another solution as even the shadow copies were not preserved. 
Again, I appreciate you helping each and every member of this forum.

I feel like I speak in the name of community when I say that you've provided great support and help, research and time, knowledge and thought. 

Best wishes,



#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,937 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:56 PM

Posted 12 December 2017 - 08:38 PM

You're welcome on behalf of the Bleeping Computer community.

We certainly appreciate your thoughtful comments and taking the time to express those sentiments.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users