'[email protected]' Ransomware – Initial Analysis
Another ransomware known as '[email protected]' Ransomware created using the platform of Crysis Ransomware, is named after its official email used to communicate with the victims. During analysis, it came into lights that the ransomware is delivered to PC users as a document along with phishing message via email services like Gmail, Outlook, Yahoo Mail etc. The email may look like an official email arrived from a shipping company such as FedEx. This spam campaigns aim to hoax you into believing that a relative of yours has sent a package so that you need confirm the address of your relative by using the attached application in the email. If you believed it and downloaded/executed the attached application then your PC will be compromised instantly because the application is a trojan dropper apparently. After activation, it will download the necessary components of '[email protected]' Ransomware and install it without your awareness. Afterwards, the game of con artist begins.
Furthermore, security investigators say that '[email protected]' Ransomware primarily targets data containers related to databases, media files, presentations, excel sheets, financial software, eBooks or archived files and combines AES & RSA standards to encrypt the data. As you may have heard that these kind of encryption standard is mostly used by Military or FBI organization to secure their highly classified data, so that none could read it without valid authorization level. Moreover, it has also been highlighted in the report that, this ransomware can encode over 200 types of files on the affected computer which also includes system files. Some of them are following:
“.sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .f.xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt, .sh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm.”
Ransom Demand by '[email protected]' Ransomware
we have received report that reveals, the ransom note of the ransomware will be present inside every folders that have encrypted files. Ransom note message inform victims to make payment of 3 BTC (2240 USD) to the attackers via Bitcoin wallet. But in order to recover 'filename.id-[8 random characters].[email protected]' files ('[email protected]'), security experts don't suggest to pay ransom fee. Because this ransomware is not programmed to delete Shadow Volume Copies of encrypted drives, hence by following the recovery instruction mentioned in the article might help you to get back your corrupted files. We recommend you to give it a try instead making payment to them and also keep a reliable Antivirus Installed on your system.
However, before moving to recovery process, it is essential to delete '[email protected]' Ransomware from your PC. Follow the guideline provided below:
Remove ‘[email protected]’ Ransomware From Your PC
Step 1: Remove ‘[email protected]’ Ransomware in Safe Mode with Command Prompt
- First of all disconnect your PC with network connection.
- Click restart button and keep pressing F8 key regularly while system restart.
- You will see “Windows Advanced Options Menu” on your computer screen.
- Select “Safe Mode with Command Prompt” and press Enter key.
- You must login your computer with Administrator account for full privilege.
- Once the Command Prompt appears then type rstrui.exe and press Enter
- Now follow the prompts on your screen to complete system restore.
Step 2: Remove ‘[email protected]’ Ransomware using MSConfig in Safe Mode:
- Power off your computer and restart again.
- While booting press the “F8 key” continuously to open “Windows Advanced Options Menu”.
- Use the arrow keys to select “Safe Mode” option and press Enter key.
- Once system get started go to Start menu. Type “msconfig” in the search box and launch the application.
- Go to the Startup tab and look for files from %AppData% or %Temp% folders using rundll32.exe. See an example below:
- Disable all the malicious entries and save the changes.
- Now restart your computer normally.
Step 3 : Kill Malicious Process Related To ‘[email protected]’ Ransomware
- Press Alt+Ctrl+Del buttons together.
- It will open the Task manager on your screen.
- Go to Process Tab and find ‘[email protected]’ Ransomware related process.
- Click the End Process Now button to stop the running process.
Step 4 : Remove ‘[email protected]’ Ransomware Virus From Registry Entry
- Press “Windows + R” key together to open Run Box.
- Type “regedit” and click OK button.
- Find and remove ‘[email protected]’ Ransomware related entries.
Now hopefully you have completely removed the ‘[email protected]’ Ransomware virus from your computer. If you are still get ransom message from the threat or unable to access your files, then it means that virus still remain into your computer. In such situation you don’t have any other option except removing this virus using any powerful malware removal tool.
Whereas if you have any backup of your infected or encrypted files, then you can also reinstall your Windows OS. This will erase all your files and data as along with the ‘[email protected]’ Ransomware infection. You will get a completely empty computer system with no files. Now you can use your backup to get your files. If you don’t have any backup then using malware removal tool is a better option for you.
If you have any query or question regarding your computer, then you can easily ask your problem to our experts. Go to the Ask Any Question page and get the answer for your query directly from out experts.