Any files that are encrypted with the original Ouroboros (Zeropadypt) Ransomware will have an ID=random 10][Mail=<email> followed by one of several known extensions to include .limbo, .Lazarus, .Lazarus+ appended to the end of the encrypted data filename as explained here by Amigo-A (Andrew Ivanov). These are examples.
.[ID=lz4ac3t2AC][Mail=legion.developers72@gmail.com].limbo .[ID=PdlZmTcS4u][Mail=recoveryunknown@protonmail.com].Lazarus .[ID=6UcENb3ezh][Mail=ScorpionEncryption@protonmail.com].Lazarus+ .[ID=SbPOa46zNc][mail=jacdecr@tuta.io].Lazarus+
.Email=[jacdecr@tuta.io]ID=[OQ0U8dJHt23zahK].KRONOS .Email=[Datarest0re@aol.com]ID =[mHYdZEKBMUqbaCs].lol .Email=[Recoveryhelp2019@protonmail.com]ID=[PJBVFUMYG54DAJ3].odveta .Email=[filedownload2020@protonmail.com]ID=[pUTxt45EeSBMs8L].rx99 .Email=[vashmail@protonmail.com]ID=[THXIOLUTWVAKONNWOEON].vash
Update 10/10/19:
I have noticed a new version of Ouroboros ransomware with extension ".odveta" today. It seems these cyber terrorists unfortunately figured out how to use cryptography and crypto++ library correctly. This new variant is using RSA+AES 256 GCM correctly and currently I cannot decrypt this variant.
It makes me wonder if extension "odveta" is only coincidence or they show some effort and look to slovak dictionary, because word "odveta" means "retaliation" in slovak. If this was intentional, then I still can't understand why this criminals and cyber terrorists think that we are attacking them and they have to retaliate back.
Because new version is not using old flaws I am releasing my Ouroboros decoder with find key function enabled. Please read README.txt file before using this function.
Post #131
Hello,
I had the perfect storm of issues after I upgrade my PC. I had gotten a license code to upgrade my Windows 10 Home PC to Windows 10 PRO. I turned on "RDP" and enabled port forwarding for port 3389 to my desktop so I can remote to in while I was out of the house. Before I had a chance to use Bitlocker to encrypt all of my files, I had an issue with my router when upgrading the firmware. By the time I got it resolved, it was late and I went to sleep.
Apparently that was enough time for Ransomware to use the 3389 port and encrypt all of my files (including 10 years of photos of my children).
All of the files now have an extension of recoveryunknown@protonmail.com.lazurus
I get a .txt file that pops up telling me I have been infected and to send them money (which I will not do).
What do you suggest I do to remove the ransomware, identify the specific variety and possibly decrypt my files?
- I uploaded the ransom .txt file and a sample encrypted file to ID Ransomware and it wasn't able to identify the specific ransomware variant.
Because I had just upgraded Windows 10 from Home to Pro I don't even have a "System Restore" that I can go back to.
Any help will be greatly appreciated.
-Randy
Edited by quietman7, 22 November 2023 - 10:30 AM.



Back to top













