Ransomware virus, help please

Hi,

a few days ago Avast free edition (which I satisfactory use for around 8 years) warned me of a malware stopped “just in time”.
Today I realised all my windows 7 SP1 PC directories contained a @README.HTML file which when opened in my other linux OS chrome browser (I have a multi-boot PC, windows and linux) stated that my files were strong encrypted and gave me directions to how I could have the password to decrypt them back paying some bitcoins.
I didn’t notice any encrypted files so I thought it must have been the malware Avast stopped a few days earlier and kept a copy of the @README.HTML file, send to Avast Lab a msg explaining what happened attaching the stopped malware dll from the virus chest.
In the evening I found some 50% of all my HD files encrypted with hexadecimal long names and extensions.
I quit windows and now from linux I’m writing this msg.
I tried to identify the ransomware using https://id-ransomware.malwarehunterteam.com/ but it says it’s an unknown virus at the moment, to backup my encrypted files and hope someday a decrypter is released.

As of now I’m not sure at all it was the malware avast stopped some days ago, even if the creation date and time of all the @README.HTML files is almost exactly (a few seconds difference) the one from the avast virus chest, the latter makes it quite likely but it would mean avast failed to actually stop it.

I’m going to backup everything encypted and not on usb external disk from linux and then reinstall win7. :cry:

Anybody else faced this virus, some help from the avast team?

TIA and best regards
Vik

Try it here: https://www.nomoreransom.org/

Hi,

thanks for reply.
I tried the site you pointed out, filled in what asked in https://www.nomoreransom.org/crypto-sheriff.php twice but does nothing, it just reloads the home page with no answer.

I’ve sent yesterday (before realizing the virus was up and running, encrypting my HD) a report to the Avast virus lab from my Avast copy itself describing what happened and attaching to the report what I am 90% sure is the virus dll which did that.
My Avast account has the same email of the Avast registered free edition from which I sent the report thus you could track me down.
Any idea, from that, about the ransomware virus type and a possible solution to decrypt my files back?

I won’t pay a single bitcoin to those guys but at the moment I cannot even login to my windows 7 OS because the virus would just finish the work with the rest of my precious data files.

I will backup every windows 7 partition data files (virus encrypted ones too in case of future decrypter release), logging from my other linux OS partition only, to external HD (long and painful but only solution I can see as of now) and then format and re-install win7.

Any better ideas?
Is Avast interested in this, presumably brand new, very dangerous ransomware virus?
How to collaborate to defeat it and have back the precious data without paying those bandits?
Just tell me, please.

Thanks for your time,
Vik

https://www.nomoreransom.org/decryption-tools.html
If those tools can’t decrypt the files and you do not have a clean backup, consider them lost.

The page you mentioned is working fine for me.

As you submitted it, wait for a reply from the viruslab.
But be patient, it’s weekend… :wink:

Thanks very much you both guys :slight_smile:

I don’t know why that page shows nothing when I upload the two requested encrypted files, the ransom instructions file as asked and hit “Go find it!” button.
I tried it out twice, just reloads the home page with no additional msg.

I’m not impatient , sorry I may sound like that :-), just wanted to know if Avast was willing to give a look into this and how to help as I could.

I’ll never pay those guys, whatever happens to my files.
I’ll try with the tools you pointed out.
They are important work files and if it doesn’t work I’ll try to get them back as much as I can from backups and PCs at workplace.

Thanks for your help and time
Vik

You’re welcome and good luck.

Hi,

I would like to add a few questions:

I’m proceding in backupping salvaged files and I noticed that in some directories while all other files are encrypted, the exe files, installation executable files and VMWARE virtual machines ones look like untouched from the virus.
Is it possible that they have been infected and left there on purpose? I know it is possible, I’d like to know if it is probable that this kind of virus does such a thing and in case if there’s a way to check those files against a potential infection.
As of now I’m backupping such files in a directory named “Potentially_Unsafe” so to see later.
Is there a way to remove the virus from the infected win7 partition so to have a chance to run a scan with Avast when it’s virus database gets updated for this specific virus?
Would in such case be Avast able to detect a change in the former executable files so to see if they are infected? In particular vmdk vmware virtual machine disk files (even if not strictly executable files)?

I know it’s hard to say for an unknown virus, I’d just like to know if for similar already known viruses and common sense this kind of infection already occurred in the past, if such doubts are feasible and how to behave to solve the problem.

Thanks for any insights and help you may give me.

in case if there's a way to check those files against a potential infection.
You can upload and test suspicious files here > www.virustotal.com / www.metadefender.com / www.jotti.org

If file is scanned before, always click rescan for a fresh result, there may be changes in scan result, additional detections added or false positive detections removed

Thanks for reply,

some of them are huge files (several GB for the vmware vmdk disk files) which makes them unfeasible to upload.
Furthermore they contain my work reserved information so I’d rather prefer an offline solution.

What do you mean exactly for “rescan”, you mean if they were scanned before by Avast? And if yes, where should I find this “rescan” option/command?

For the future, are you aware of any windows software to make an md5 so to check later or I should do it from linux?
Is this already an Avast feature?

Thanks

What do you mean exactly for "rescan", you mean if they were scanned before by Avast?
No by the online scanner

example: uploading a random file from my computer windows system32 folder

as you see from the scan time it was don 8 months ago
https://www.virustotal.com/en/file/8728c02322fba1be78755606e4f6b725d19d3772b93ef23588e5125a1378c206/analysis/

here after rescan you can see scan time was 0 minutes ago
https://www.virustotal.com/en/file/8728c02322fba1be78755606e4f6b725d19d3772b93ef23588e5125a1378c206/analysis/1469974245/

extra file info is found using the additional tabs, like who made it / digitally signed / first time scanned by VT … and lots more

also use the tabs at top to find FAQ info about virustotal, change language …

seems the scan time was changed to latest on both links bc i had two tabs open on same file scan, if you click additional tab and scroll down you find first time scanned by VT

anyway thats how it works, just try with a random system file.
The popup box will have option to view lates scan result or rescan if scanned before

files detected by Advanced heuristic and reputation engines and monitored by cloudsystems will show at the bottom under additional info tab

example can be seen here > click additional information tab and scroll down
https://www.virustotal.com/en/file/47b8db81218cdb7469486b7727b689db061369dc3622e12dff404be98aadc924/analysis/

Thank you,

I’ll give it a shot :smiley:

Still got no reply from the Avast team.
Not interested in such a virus?
How to know if they are looking into this?

avast only contact you if they need/want more information about the file(s) you have submitted.

Furthermore they contain my work reserved information so I'd rather prefer an offline solution.
The mentioned online scanners don't care what information is in the file(s). They just check for (possible) malware. Best offline solution > format the drive(s) and start from scratch.

Hi Eddy,

that’s exactly what I’m doing (restarting from scratch).
I wanted to know if Avast would take a look at the virus (which is the worst one I met in the last 20 years probably, I remember in total not more than 5, but none as destructive as this one) and add it to the virus definitions.
I thought that reporting it they would contact me, at least for further details.
It puzzles me the lack of any feedback.
Probably I just don’t realize how many viruses are reported every day.
This is a really bad one, though, and defeated Avast totally, so they should be interested in it.

I also hope one day I may recover my encrypted files (which I made a backup of), but that looks hopeless if the virus is not even acknowledged…

Let’s see if I can respond without writing a entire book ;D

that's exactly what I'm doing (restarting from scratch).
I hope you do it the correct way. - Disconnect from the net (pull the plug out) - Install Windows - Install all drivers (or at least make sure they all are installed correctly if Windows provides them) - Install a av - Go online and download/install all updates that are available for Windows and the av (if it doesn't happen automatically already) The following are user specific/users choice, but I recommend to do them : - "Tweak" Windows to your needs/how you want (settings, colors and such things) - Install the applications you normally use and make changes to the settings as you wish. - Place back the data that you need/want from a clean backup - Install a tool that automatically creates a backup of date/the entire system (as you want) on a regular base. - Create a image of the drive

Create/store the backup online.
Why?
Guess what will happen if the house burns down or if there is a burglary (hope it will never happen ofcourse).
In such cases gone is not only the system, but also the backup if it is stored/kept in the same house.

I wanted to know if Avast would take a look at the virus
avast does have a look at what someone submitted. I can be wrong here, but I believe first analysis is done automatically and if needed a person is having another look at it. This has to do with the huge amount of samples people sent to them each day. On a quiet day, 350.000 new (or variants of existing) malware is found. Analyzing them all manually would take the amount of people that live in a small country ;D
I thought that reporting it they would contact me, at least for further details.
As I said, they will contact you if they need/want more information.
It puzzles me the lack of any feedback.
I agree this a point for them to improve. A automated email with something like : - We have received your sample (on date, filename, hash) - First analysis will be done automatically. - If needed a person will have a further look at it. - We will not contact you about this unless we need/want more information - If the sample is found to contain new (or a new variant of existing) malware, we will add detection for it to the VPS
so they should be interested in it
They sure are interested in it. Hence why they have the option to submit a sample ;) ;D

I do not know how far they are with the development of it, but avast is working on a tool/module for the av that detects/prevents infections with ransomware.
But it is not easy to create one without unwanted side-effects.
There are tools (Windows has it build in) that can encrypt date/entire drive content.
To say it simple, those tools do exactly the same as the ransomware does.
Difference is ofcourse that you have the key to decrypt the files.
So a tool to prevent ransomware must not detect those legitimate file/drive encryption tools.

As for the decryption of your files, keep a eye on https://www.nomoreransom.org
The keys they have there come from confiscated servers/systems from people that are behind the ransomware.
More keys will be added when they find them.
To be honest, chance that they find the key you need is small.
Have a deep breath and consider the files gone.
Learn the lesion (I think you already have) and backup frequently.

Don’t forget there is always the malware first.
After being discovered, research must be done to see how it operates.
And only then it is possible to go find a protection/cure.
Meaning all new malware can (and likely will) do damage before it is stopped.

Hi Eddy,

thanks so much for the good advices and suggestions.
I didn’t know and never could think so many malware (350K) could ever be developed everyday.
If these are official numbers, it means there’s a sort of industry behind.
It’s quite scaring.

About re-installing windows, that’s exactly the way I would do that.

About making a regular backup: that’s a bit more troublesome, but definetely I should start to do it on a regular basis.
Most of the encrypted files were already backed up or I could gather them together again from other machines (even at work).
What annoys me is the fact that I’m never sure they were all, and every now and then something I need and couldn’t find will pop up as one of the lost files.

Making a regular back up requires discipline and quite big backup HDs :-
Anyway I think this time I learned the lesson and I will find one of those free apps to make incremental backups.
All I need then is the patience to use it ::slight_smile:

About improving the Avast virus acknowledge service: surely they can make it better and at least send back an automatic feedback, but it’s probably me not realizing they cannot simply track every single report.

Thanks for telling me about the keys: I didn’t know they had key lists.
I’ll try and see if mine could be on https://www.nomoreransom.org.

I didn't know and never could think so many malware (350K) could ever be developed everyday.
Statistic > https://www.av-test.org/en/statistics/malware/

TrendMicro blog > http://blog.trendmicro.com/malware-1-million-new-threats-emerging-daily/

Info about what F-Secure cloud handle on a a day (2015)

SECURITY CLOUD METRICS Security Cloud is a high-volume system. It is a critical component for most computers protected by F-Secure’s technology.

Number of queries per day received by Security Cloud’s servers About 5 billion per day (mid 2015)
Number of unique samples received per day by Security Cloud About 1 000 000 (mid 2015)
Average number of items (files and URLs) checked per day by a client’s local
Security Cloud module
About 28 000 per day on average

If these are official numbers, it means there's a sort of industry behind.
Just google > [b]malware industry[/b] and you find a ton of info