DetoxCrypto ransomware is another Pokémon themed crypto-virus, which appeared just a day ago. This ransomware seeks to encrypt sixty file extension types and gives victims a period of only three days to pay up. The ransom price that is asked is 3 BitCoins which is approximately 1,727 US dollars. If the three day period passes without payment is made, your files will get deleted.
Carefully read the article to see how to remove the virus and try recovering some of your files.
|Short Description||The ransomware seeks to encrypt files with 60 file extensions. You are given three days to pay, otherwise your files get deleted.|
|Symptoms||The ransomware encrypts files, without changing their names or extensions. After that it shows a ransom note as your desktop background and in a pop-up window on your desktop.|
|Distribution Method||Spam Emails, File Sharing Networks, Executable Files|
See If Your System Has Been Affected by DetoxCrypto
Malware Removal Tool
|User Experience||Join Our Forum to Discuss DetoxCrypto.|
DetoxCrypto Virus – Spread
The DetoxCrypto ransomware has been discovered by the MalwareHunterTeam. The crypto-virus could be spreading through executable files. DetoxCrypto might spread a file with its payload via spam email campaigns, and place that the file as an attachment. If you open attachments with unknown origins or even vaguely suspicious ones could activate the virus, so it is far from advised. The ransomware’s owners might also involve social media networks and file-share services in their devious plan, and host a payload file there as well. Be extremely careful with the things you click on, what you download and open. A future entry point for the ransomware might become an Exploit Kit if it is not yet a reality.
DetoxCrypto Virus – Analysis
DetoxCrypto is a ransomware crypto-virus, which will lock your files and deem the unusable. Not a lot of details are known at the moment, but the ransomware might be somehow related to the PokemonGO ransomware. Although they seem to be written with a different code, the creators could turn out to be the same.
After successful encryption, DetoxCrypto ransomware will put an image as your desktop background, and a window will pop-up both revealing the ransom message. You can see an earlier version of the ransom note here:
The text from the actual ransom note is the following:
We are all Pokemons
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and
nobody can decrypt your files until you pay and obtain the private key. If you see the main locker window, follow the instructions on the locker. Otherwise, it’s seems that you or your antivirus deleted the locker program.
Now you have the last chance to decrypt your files.
Server accepts payment in Bitcoin (BTC) only.
If you have bitcoins:
1. Pay amount of 3 BTC to address: ***********
2. Transaction will take about 15-30 minutes to confirm.
If you do not have bitcoins:
1. Open one of the exchangers:
and select exchange in your country and currency.
Or open hxxps://localbitcoins.com/ and find person who sells bitcoins near you.
Buy 3 BTC and make direct deposit to bitcoin address: *******
Exact payment amount can vary depending of exchange rates.
4. Transaction completion may take several days.
Reload this page in 15 minutes. After transaction completes you will be redirected to decryption page.
Don’t worry if some errors occurs and connection was broken. Wait 15 minutes and press F5.
Contact email for private key: firstname.lastname@example.org
Different variants of the DetoxCrypto virus use these emails for contact:
The ransomware asks the price of three BitCoins, which is the equivalent of 1,727 US dollars. If three days go by without you paying the cybercriminals, your files will get erased. That will be the case if the threat in the ransom note turns to be true. Paying these crooks is not advised – if you do, you will only support them and aid their criminal actions. There is no guarantee that they will decrypt your files or even answer you.
According to a post on a malware researchers’ twitter, DetoxCrypto ransomware searches to encrypt files with around 60 different file extensions. You could see the list below:
→.bak, .mdf, .sql, .cs, .php, .xls, .doc, .xlsx, .docx, .zip, .rar, .7z, .tar.bz2, .tar, .cab, .iso, .dat, .mdb, .db, .sqlite, .csv, .s3db, .sqlitedb, .dbf, .myd, .ibd, .ibz, .xlt, .ppt, .pptx, .backup, .3ds, .pdf, .eps, .psd, .psb, .acbl, .cdr, .txt, .xml, .pst, .jpg, .jpeg, .bmp, .JPG, .JPEG, .BMP, .cpr, .all, .rns, .pptx, .xltx, .png, .PNG, .GIF, .gif, .dwg, .der, .crt, .cer
After the file encryption process is completed successfully, all files will remain with the same names and extensions they had before the encryption.
As you can see from the picture below, there are already detections of the crypto-virus on the VirusTotal website platform. The file in which the virus is wrapped bears the name MicrosoftHost.exe.
It is unclear whether DetoxCrypto ransomware erases Shadow Volume Copies from the Windows Operating System, but it is probably the case.
Remove DetoxCrypto Virus and Restore Your Files
If your computer got compromised and is infected with the DetoxCrypto ransomware virus, you should have some experience with removing viruses before dealing with it. You should get rid of this crypto-virus as fast as possible before it spreads deeper in the network you use and encrypts more files. The recommended action for you to take is to remove the virus completely by following the step-by-step instructions manual provided down here.
Manually delete DetoxCrypto from your computer
Note! Substantial notification about the DetoxCrypto threat: Manual removal of DetoxCrypto requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.