I think there may be two file encryption algorithms, BlowFish and AES, 56 bytes is the IV value of AES encrypted with BlowFish, and the last 32 bytes is the AES-256 key.
Posted 02 December 2021 - 03:22 AM
I think there may be two file encryption algorithms, BlowFish and AES, 56 bytes is the IV value of AES encrypted with BlowFish, and the last 32 bytes is the AES-256 key.
Posted 03 December 2021 - 04:03 PM
Nope. It's ChaCha20, AES-128, and Curve25519.
ID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]
RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]
CryptoSearch - Find Files Encrypted by Ransomware [Support Topic]
If I have helped you and you wish to support my ransomware fighting, you may support me here.
Posted 03 December 2021 - 06:02 PM
@everyone
If you have been encrypted by this ransomware, please DM me with the following information:
* Simply use any third-party sharing site (SendSpace, Mega, Dropbox, GDrive, etc...) to give me a link to the files.
ID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]
RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]
CryptoSearch - Find Files Encrypted by Ransomware [Support Topic]
If I have helped you and you wish to support my ransomware fighting, you may support me here.
Posted 07 December 2021 - 05:56 AM
Nope. It's ChaCha20, AES-128, and Curve25519.
roger .is there a more detailed analysis of the cryptographic algorithm?thank you sir
Posted 08 December 2021 - 02:45 AM
@everyone
If you have been encrypted by this ransomware, please DM me with the following information:
- *1-2 encrypted files
- A copy of your ransom note
- Whether you are a home user or if this affected a business
* Simply use any third-party sharing site (SendSpace, Mega, Dropbox, GDrive, etc...) to give me a link to the files.
​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​
Posted 07 February 2022 - 01:10 PM
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 20 February 2022 - 07:11 PM
Hello, according to the tutorial of your website, after the third part, I have to enter the password of the previous decrypter to proceed to the next step, but I have not decrypted it before, what should I do
Posted 20 February 2022 - 07:51 PM
I used the "avast_decryptor_targetCompany64" tool to decrypt it. After the third step, I have to enter a password to proceed to the next step, but I have not decrypted it before, so there is no password,
Posted 20 February 2022 - 08:34 PM
Did you submit (upload) samples of encrypted files, ransom notes and any contact email addresses provided by the cyber-criminals to ID Ransomware (IDR) for assistance with identification and confirmation of the infection?
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 20 February 2022 - 08:44 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 20 February 2022 - 09:35 PM
Are you sure the encrypted file extension is .avast?
The TargetCompany ransomware has several variants - .avast doesn't appear to be one of them.
Posted 20 February 2022 - 09:48 PM
Are you sure the encrypted file extension is .avast?
The TargetCompany ransomware has several variants - .avast doesn't appear to be one of them.
Yes, the suffix is. Avast. Can I send you a ransom file and a ransom note
Posted 20 February 2022 - 09:50 PM
Can you provide (copy & paste) the ransom note contents in your next reply?
Posted 20 February 2022 - 09:53 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 20 February 2022 - 09:57 PM
Did you submit (upload) samples of encrypted files, ransom notes and any contact email addresses provided by the cyber-criminals to ID Ransomware (IDR) for assistance with identification and confirmation of the infection?
It's been submitted, but it's possible to decrypt it under certain conditions
0 members, 1 guests, 0 anonymous users