Posted 24 November 2016 - 07:39 AM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 25 November 2016 - 08:52 AM
Is there a history of file decryption after a few months of the initial infection by ransomware?
Posted 25 November 2016 - 10:57 AM
Is there any way to recover my files, maybe with a program like RECUVA ?
For now i will clone my C: drive (os drive) to a second drive on my computer.
Then i will format the c drive and reinstall windows.
Is it possible that the ransomware will come back? from the clone of the c drive?
Because i did not find any corrupt files or did not delete anything.
After that i just wait, because maybe someday a decrypter wil come out and i can have my files and pictures back?
Posted 25 November 2016 - 11:23 AM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 25 November 2016 - 12:00 PM
As with most ransomware infections...the best solution for dealing with encrypted data is to restore from backups. These types of infections typically will delete all Shadow Volume Copies so that you cannot restore your files via System Restore, native Windows Previous Versions or using a program like Shadow Explorer. But it never hurts to try in case the malware did not do what it was supposed to do...it is not uncommon for ransomware infections to sometimes fail to properly delete Shadow Volume Copies. In some cases the use of file recovery software such as R-Studio or Photorec may be helpful to recover some of your original files but there is no guarantee that will work.
Thank you for the answer.
as for the backups. My antivirus did not find any corrupt files, so if i clone my drive to another drive on my computer en reinstall windows, it is not possible that the dharma virus reinstalls itself?
Posted 25 November 2016 - 01:09 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 25 November 2016 - 09:36 PM
have a PC that I just use as a Live monitor for my cameras(synology survielance station). Connect to it through RDP when i need to access it. Nothing really installed on it.
Logged into it today to see my wallpaper changed saying bitcoin143 blabla. Two instances of "Skanda 23.exe" running.
I know most times ransomware froma n email attachment or some website.. but litterly dont do anythign but surveillance station on the machine.
side note: only reason I RDPd in was cus it was doing a windows update and it hanged configured so i did a physical reboot of pc then logged into it to see that nice wallpaper. I rdp into a admin account my synology webbrowser only displays on a nonadmin account(and that user profile didnt have a notice. My only guess is its RDP how it came in... not too sure
Posted 27 November 2016 - 10:52 AM
Just picked up a brand new client. As such, we haven't completely gone through their systems to find all the "issues."
Woke up today to an alert that several of their servers were offline. One of their servers (Which is a Hyper-V host, DC and file server, don't get me started) ran out of space. Probably the best part in all of this. Scariest part - no backups at all (Don't ask, item #1 on the top 100 issues we found so far.)
It ran out of space because they had the box open to the world via RDP and also had weak passwords on some AD accounts. Looks like someone got in and unleashed this new Dharma ransomware.
I wanted to upload some files here (http://www.bleepingcomputer.com/submit-malware.php?channel=168) because I have to imagine we're in a somewhat unique situation in that we "caught" the malware running and it A) didn't complete encrypting files and was still running and the executable(s) existed.
So I found acrotray.exe in the offending user's startup folder under the start menu. It was still running as the user (even though I logged the user out and then locked the AD account.) Couldn't kill the process. Ran process explorer and it had a few hundred threads running including some hooks in to system and lsass. It was also running chrome.exe from the user's appdata/local/google folder. That had been running for days and I also couldn't kill this process.
Rebooted the server and neither process restarted, but both files still existed. I did some diagnosis on the server and found LOTS of the how to repair files in various folders, as well as encrypted files. Here's the kicker - it APPEARS since the process didn't finish, it never deleted the original files (In most folders.) So while the files were encrypted, I still have most of the originals. Only one folder had its original files deleted and it may not even be an important folder.
So I've uploaded an ico file that was encrypted and zeroed out. Also uploaded the acrotray.exe and some chrome files. Let me know if there's anything else I can provide whether files or info.
Did reach out to the hackers (worm01@india.com) and they want 2 bitcoins today, 3 tomorrow, 4 the next day. FYI.
Posted 27 November 2016 - 04:34 PM
ID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]
RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]
CryptoSearch - Find Files Encrypted by Ransomware [Support Topic]
If I have helped you and you wish to support my ransomware fighting, you may support me here.
Posted 28 November 2016 - 10:06 AM
A new variant has been identified with the pattern ".[<email>].wallet".
ID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]
RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]
CryptoSearch - Find Files Encrypted by Ransomware [Support Topic]
If I have helped you and you wish to support my ransomware fighting, you may support me here.
Posted 28 November 2016 - 02:30 PM
Today our SQL server has been infected, all filles, except windows and programs folders, but in "C:\" I found a folder called "data" in there's a few files with rare names, one name "crypkey.bin", anyone has the same folder? is this a way to decrypted my files? any tool to do it?
Thanks a lot
Posted 28 November 2016 - 04:08 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 29 November 2016 - 03:39 AM
A new variant has been identified with the pattern ".[<email>].wallet".
@Demonslay335, we got the pattern .wallet. I already submited a copy before/after file and a suspicious .exe file. in my case AVAST and Malware-bytes were not able to detect/remove this ransomware variant. :-(
Posted 29 November 2016 - 12:29 PM
Another variant seems to be trying to spoof Locky by using ".[<email>].zzzzz". Note that the original filename is not renamed like the real Locky; ID Ransomware will naturally tell the difference for victims.
https://twitter.com/demonslay335/status/803641024346144768
Edited by Demonslay335, 29 November 2016 - 02:22 PM.
ID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]
RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]
CryptoSearch - Find Files Encrypted by Ransomware [Support Topic]
If I have helped you and you wish to support my ransomware fighting, you may support me here.
Posted 29 November 2016 - 01:44 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
0 members, 4 guests, 0 anonymous users