Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

email-dorispackman@tuta.io.ver-CL 1.5.1.0.id- HELP


  • This topic is locked This topic is locked
5 replies to this topic

#1 lasts0n

lasts0n

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:23 PM

Posted 08 March 2018 - 02:16 PM

Hello All,

long time lurker first time unfortunate poster

One of our clients just got hit with this on Tuesday. brute force attack over rdp 3389, found a user that was "needed" by client to scan and had a weak password. backups were compromised as well because share was left accessible to domain users huge screwup but i digress.  

filename:

email-dorispackman@tuta.io.ver-CL 1.5.1.0.id-1614714137-578233478334310455516964.fname-%file that was encrypted name%.doubleoffset (added the file that was encrypted myself each file has the long name and the original file name before .doubleoffset

 

"ransome note" is readme.txt:

 

write you country to dorispackman@tuta.io 

ID RANSOME shows:

 

1 Result

Cryakl

This ransomeware may be decryptable under certain circumstances. Please refer to the appropriate guide for more information.
identified by

sample_extension: email-<email>.ver-CL <version>.id-<random>-<date>.fname-<filename>.<extension>.doubleoffset

CLick for more info about cyakl

which lead me to the ransome ware group here. 

tried several kapersky decryptors non worked. tried emisoft xorist also no dice.

i guess wanting to know if anyone has seen this version yet or has any ideas. seems to be the consensus that its a wait and hope approach to a key becoming available. 

thanks for any help or suggestions

 

 



BC AdBot (Login to Remove)

 


#2 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:23 PM

Posted 08 March 2018 - 02:38 PM

The newest versions are not decryptable.

 

You can't just throw random decrypters at files and hope they work. Kaspersky's Cryakl decrypter is only for older versions, and Xorist is a completely different ransomware family with different (weak) encryption.

 

https://twitter.com/demonslay335/status/971164798376468481


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#3 lasts0n

lasts0n
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:23 PM

Posted 08 March 2018 - 03:20 PM

The newest versions are not decryptable.

 

You can't just throw random decrypters at files and hope they work. Kaspersky's Cryakl decrypter is only for older versions, and Xorist is a completely different ransomware family with different (weak) encryption.

 

https://twitter.com/demonslay335/status/971164798376468481

Thanks for the quick response.  As you can expect with something like this youre apt to try anything in false hope that it will work.  

I guess hopefully a decryption method will become available in the future for it. 



#4 mike 1

mike 1

  • Members
  • 207 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Russia, Moscow
  • Local time:11:23 PM

Posted 08 March 2018 - 05:16 PM

 

 

i guess wanting to know if anyone has seen this version yet or has any ideas. seems to be the consensus that its a wait and hope approach to a key becoming available.

Hi, you have a sample (ransomware/virus)? You can upload virus on https://www.hybrid-analysis.com/ or https://www.virustotal.com?


Мы разные, но идея одна! 


#5 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:02:23 PM

Posted 08 March 2018 - 05:35 PM

@mike 1

 

Here's a sample of the 1.5.1.0 version with the same extension: https://www.virustotal.com/en/file/735abbb3b5a1e7eeb625696c92c08ca4cfda110c1f6627524ade4f368a311bc0/analysis/1520380969/


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,750 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:23 PM

Posted 08 March 2018 - 06:54 PM

Since the infection has been identified, rather than have everyone with individual topics, it would be best (and more manageable for staff) if victims posted any more questions, comments or requests for assistance in the below support topic discussion.To avoid unnecessary confusion, this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users