Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

eCh0raix Ransomware - QNAPCrypt/Synology NAS (.encrypt) Support Topic


  • Please log in to reply
1197 replies to this topic

#1 Perie

Perie

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:48 AM

Posted 21 June 2016 - 02:56 AM

hello,
 
I also have the same issue. Some of my files have been encrypted with the .encrypt extension.
 
Please how can i decrypt this?
 
Thank you

 

 

.

Note: ECh0raix is not related to Muhstik. As such, victims of ransomware with the .muhstik extension, please post in this Support Topic.
 

BloodDolly released a free ECh0raix Decoder decryption tool (Post #184) which can find the key and decrypt old variants of ECh0raix for victims infected prior to July 17, 2019. Using this decoder, victims can brute force the decryption key for encrypted files and use it to restore them. Everyone infected after July 19, 2019 was hit with new variant. A quick way to tell if your are a victim of the new unbreakable version is if the key at the end of the ransom note is 173 characters long. 
 
BloodDolly updated ECh0raix Decoder (V1.0.6) so victims can use any file as a source of decryption keys, however the decoder still cannot find the decryption key for newer versions of ECh0raix. See Post #707. Alternate download link and instructions provided here.
 
Newer versions of eCh0raix Ransomware (July 19, 2019 and later) are not decryptable without paying the ransom (not advisable) and obtaining the private encryption keys from the criminals who created the ransomware unless they are leaked or seized & released by authorities. Without the criminal's master private key that can be used to decrypt your files, decryption is impossible. That usually means the key is unique (specific) for each victim and generated in a secure way (i.e. RSA, AES, Salsa20, ChaCha20, ECDH, ECC) that cannot be brute-forced
 
Some eCh0raix victim's reported successful decryption using Kaspersky's RakhniDecryptor Tool. See the comments provided by Demonslay335 in Post #151. Amigo-A also advised Dr.Web may be able to assist with decryption in Post #152.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:48 PM

Posted 21 June 2016 - 07:09 AM

You can submit (upload) samples of encrypted files, ransom notes and any contact email addresses or hyperlinks provided by the malware developer to ID Ransomware (IDR) or Emsisoft Identify your ransomware for assistance with identification and confirmation of the infection. This is a service that helps identify what ransomware may have encrypted your files, whether it is decryptable and then attempts to direct you to an appropriate support topic where you can seek further assistance. ID Ransomware can identify ransomwares which adds a prefix instead of an extension and more accurately ransomwares by filemarkers if applicable. Uploading both encrypted files and ransom notes together along with any contact email addresses or hyperlinks provided by the criminals gives a more positive match with identification and helps to avoid false detections.

 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#3 frankiewu61

frankiewu61

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 22 June 2019 - 11:28 AM

My file is encrypt by .encrypt extension but .....not alphaDecrypter

Could I have any chance to save ?

 

 

 

 

All your data has been locked(crypted).
How to unclock(decrypt) instruction located in this TOR website: http://sg3dwqfpnr4sl5hh.onion/order/1MCKJvCc4qQvQ2q45stXcUwRknEhFvdkH9
Use TOR browser for access .onion websites.
 
 
Do NOT remove this file and NOT remove last line in this file!
ow9Hd5MoqpZikd0xlyiYizxeu5stzTEvcyBeOL1LMvTXp9RAcv361EBBrTKulWfAqc+/0kZWJIARZrgeYOdq4A==

Attached Files



#4 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:48 PM

Posted 22 June 2019 - 04:09 PM

You have replied to a topic almost three years old.

 

The .encrypt extension is now more generic since it is used by several types of known and  unidentified ransomware.

 

The only way to identify the different ransomwares that use a "generic extension" is the ransom note (including it's name and contents), samples of the encrypted files, possible filemarkers, the malware file itself responsible for the infection and information related to any email addresses or hyperlinks provided by the cyber-criminals to request payment.

As I noted above, you can submit (upload) samples of encrypted files, ransom notes and any contact email addresses or hyperlinks provided by the malware developer to ID Ransomware (IDR) for assistance with identification and confirmation of the infection. Uploading both encrypted files, ransom notes and any contact email addresses or hyperlinks provided by the malware developer together provides a more positive match with identification and helps to avoid false detections. Submitting any email addresses or hyperlinks provided by the criminals may also be helpful with identification.

 

Please provide a link to the ID Ransomware results. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 (Michael Gillespie) to manually inspect the files and check for possible file markers.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#5 frankiewu61

frankiewu61

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 22 June 2019 - 09:01 PM

Thank you quietman7

I Try to used ID Ransomware (IDR) And upload the text and encerpt file

The result is may be Alpha,Crypy,KeRanger

 

I will keep search more information ,thanks a lot

 

I try used README_FOR_DECRYPT tor hyperlink to IDR,it give me a sha

Please reference this case SHA1: 68164fa290904ac8236ea7a012eebb5b05bbf7dd

Attached Files


Edited by frankiewu61, 23 June 2019 - 02:34 AM.


#6 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:48 PM

Posted 23 June 2019 - 07:25 AM

Ok. Please be patient until Demonslay335 has a chance to review the case SHA1 you provided. He may be able to gather some information by manually inspecting the files. He is inundated with support requests and and it may take some time to get a reply.
 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#7 frankiewu61

frankiewu61

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 23 June 2019 - 10:03 AM

Ok. Please be patient until Demonslay335 has a chance to review the case SHA1 you provided. He may be able to gather some information by manually inspecting the files. He is inundated with support requests and and it may take some time to get a reply.
 

-------------------------------------------------------------------------------------------------------------------------

OK Thanks a lot ~~~~have a nice day

 

Update 

May be not useful , i tried used GibonDecrypter , this tool say decrypt success , but no luck

 

 

 

Attached Files


Edited by frankiewu61, 23 June 2019 - 10:31 AM.


#8 mars2374

mars2374

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:48 PM

Posted 24 June 2019 - 01:24 PM

Looks like I am in the same situation. Uploaded to IDR and got the same results. Files attatched.

Attached Files



#9 eggxpert

eggxpert

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 24 June 2019 - 09:08 PM

I'm suffered from the same symptoms, most of my clients are Mac OSX while the encrypted files are on a QNAP NAS, users had NOT isolate the NAS and clients, and was copying files on every clients. I've install Avast on most of the clients (2 are too old and OS cannot be upgraded, so Avast not supported). 

 

How bad can it be? 

How to stop further infection, identify and ease the malware?

How to prevent and avoid future infection?

How to recover?

 

The symptoms was first discovered on 21 Jun 2019 00:43 (GMT+8), I will try to upload the information and files. Thanks! 

 



#10 eggxpert

eggxpert

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 25 June 2019 - 02:08 AM

Attaching the files for Demonslay335 please. I think we all get the same, and at the aliked time.

Attached File  for-ransomware-identification-eggxpert-20190625.zip   122.06KB   31 downloads

 

I'm suffered from the same symptoms, most of my clients are Mac OSX while the encrypted files are on a QNAP NAS, users had NOT isolate the NAS and clients, and was copying files on every clients. I've install Avast on most of the clients (2 are too old and OS cannot be upgraded, so Avast not supported). 

 

How bad can it be? 

How to stop further infection, identify and ease the malware?

How to prevent and avoid future infection?

How to recover?

 

The symptoms was first discovered on 21 Jun 2019 00:43 (GMT+8), I will try to upload the information and files. Thanks! 

 

 



#11 frankiewu61

frankiewu61

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:48 AM

Posted 25 June 2019 - 03:58 AM

m

 

I'm suffered from the same symptoms, most of my clients are Mac OSX while the encrypted files are on a QNAP NAS, users had NOT isolate the NAS and clients, and was copying files on every clients. I've install Avast on most of the clients (2 are too old and OS cannot be upgraded, so Avast not supported). 

 

How bad can it be? 

How to stop further infection, identify and ease the malware?

How to prevent and avoid future infection?

How to recover?

 

The symptoms was first discovered on 21 Jun 2019 00:43 (GMT+8), I will try to upload the information and files. Thanks! 

Me too , my clients are MAC OSX and encrypted files on a QNAP NAS



#12 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:48 PM

Posted 25 June 2019 - 05:09 AM

See my comments in this topic in regards to removing the malware responsible for the infection and saving your encrypted data.

The best defensive strategy to protect yourself from malware and ransomware (crypto malware) infections is a comprehensive approach to include prevention. Make sure you are running an updated anti-virus and anti-malware product, update all vulnerable software, use supplemental security tools with anti-exploitation features capable of stopping (preventing) infection before it can cause any damage, disable VSSAdmin, close Remote Desktop Protocol (RDP) if you do not need it and routinely backup your data.

For more suggestions to protect yourself from malware and ransomware (crypto malware) infection, see my comments (Post #14) in this topic...it includes a list of prevention tools.
 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#13 zerocool64

zerocool64

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:48 AM

Posted 25 June 2019 - 11:55 AM

Hello everybody,
 
I have ransomware of my dad's nas.
 
It took some times to me to find out the real problem. First, I thought that the pc was compromised because I found some files on my network drive encrypted.
 
During my research, the nas pops me severals time with the message "HTTP Login Failed", like every second.
 
Now I have 400 files encrypted and any "ransomware id" tool or online one's found which ransomware is it.
 
The files are encrypted with a .encrypt extension.
 
Is anyone have a idea ?


#14 zerocool64

zerocool64

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:48 AM

Posted 25 June 2019 - 01:25 PM

I have the same issue, exactly the same README file and files encrypeted were on a qnap nas.
 
Now, the nas is only accessible from local network, no external access and I have removed HTTP auth and webdav.
 
I have 400 files infected including some I can't recover.
 
If you found a resolution please let me know, I will do the same.


#15 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,049 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:08:48 AM

Posted 25 June 2019 - 02:35 PM

Hello

 

There is another new topic here, which describes the case of encrypting files with the same .encrypt extension.

Perhaps, you can find similar details and tell us.


Edited by Amigo-A, 25 June 2019 - 02:35 PM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 





3 user(s) are reading this topic

0 members, 3 guests, 0 anonymous users