Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove Crypz Ransomware Virus and Restore .Crypz Encrypted Files

New Update! Malware researchers from Kaspersky have updated their Rannoh Decryptor utility with decryption for the CryptXXX 3.0 ransomware family. Files should be fully decrypted with the help of that software. You can find its download page and instructions at: Kaspersky’s Rannoh Decryptor page.
Update! It appears that some sort of a glitch reveals the private decryption key for this Crypz ransomware. You just need to enter your personal ID on the page and you should have the page saying that you have paid and give you the key. You can check this at http://xqraoaoaph4d545r.onion.to – but if it does not say that you have paid – do not pay!

STF-crypz-ransomware-virus-cryptxxx-variant-ransom-note-small

The CryptXXX 3.0 ransomware virus is back with a new variant. Files are encrypted with a .crypz extension. This time, the ransomware is more ruthless than before. Not only does it spread more aggressively through exploit kits but the newest variant may come with an infostealer called StillerX.

When encryption is finished, the ransomware will give you a personal ID, which you are supposed to use to pay for decryption. To see how to remove this ransomware virus and what you could do to recover your files, you should read the whole article.

Threat Summary

Name Crypz Ransomware
Type Ransomware
Short Description The latest variant of the CryptXXX ransomware. Encrypts your files (including ones found on network drives) and asks money for decryption giving you a personal ID for the purpose.
Symptoms The ransomware encrypts files with a .crypz extension. Creates a ransom note and gives links to specific sites, based on the Tor browser. It asks for payment to supposedly give access to a decrypter.
Distribution Method Email Attachments, Executable Files, Exploit Kits
Detection Tool See If Your System Has Been Affected by Crypz Ransomware

Download

Malware Removal Tool

User Experience Join Our Forum to Discuss Crypz Ransomware.

Crypz Ransomware – How Did I Get Infected?

Crypz ransomware can infect you through more than one way. Exploit kits remain the main cause of the infection being spread so rapidly. The exploit kits that are mainly used are Angler EK and Bedep EK. Other exploits might be involved as well, including the EITest malware campaign, which redirects to Angler, from compromised sites and hijacked sub-domains.

Spam emails continue to be a common factor in the spread of the Crypz ransomware. The emails have attached files which contain an executable file with malicious code. The malware code could be the actual ransomware, or other malware delivering files for the real threat to a compromised device.

Another well-known way for spreading the Crypz infection is via social media and file-share networks. DropBox was used in the past for spreading previous variants of the virus, disguised as something else like a useful app. You should be very wary of what you are downloading, opening or clicking, especially from a source with unknown origin. Steer away from suspicious links and files is the best tip to follow in such a situation.

Crypz Ransomware – Technical Information

The CryptXXX ransomware is back with a bang. The name UltraCrypter doesn’t seem to be in play anymore. This time, it can infect network drives, comes with an infostealer which can extract account credentials and passwords from a victim’s computer. For more information about these new capabilities of the ransomware, read the article on CryptXXX Version 3.100

The newest variant of the ransomware is dubbed Crypz and asks for money to be paid as ransom. If left unpaid the price rises. Files have a .crypz and that’s from where the name comes from. Once infected a registry key is created associated with the virus:

→HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2

A .html file is created when encryption is completed and the name of the file may be random. The file opens a browser to show the .html code. This is done for one reason – to make the links given inside clickable. This file spreads copies of itself around numerous locations which have encrypted files. The same file with the text inside is made into a .bmp picture as well. The picture is set as a desktop background after the encryption process.

You can have a look at the .bmp file down here:

STF-crypz-ransomware-virus-cryptxxx-variant-ransom-note

The file contains various hyperlinks and a changed version of the sites for decryption. The sites might redirect you to other pages for payment which indicates that cyber criminals have multiple domains created for the task. The file shown above reads:

NOT YOUR LANGUAGE? USE https://translate.google.com

What happened to your files ?
All of your files were protected by a strong encryption with RSA4096
More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem)

How did this happen ?
!!! Specially for your PC was generated personal RSA4096 Key , both public and private.
!!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet.
!!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server

What do I do ?
So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way
If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment

Your personal ID:

For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below:

If for some reasons the addresses are not available, follow these steps:

1 – Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en
2 – After a successful installation, run the browser
3 – Type in the address bar http://
4 – Follow the instructions on the site

Be sure to copy your personal ID and the instructions link to your notepad not to lose them.

If you follow any of the provided web links which are displayed, you will see the following page load:

STF-crypz-cryptxxx-ransomware-.crypz-extension-decryption-site-service-page

Entering your personal ID number will get you inside the system of the decryption service. Inside, you will find full payment instructions as past variants:

Your files are encrypted
If you do not pay for decrypting until [Date], the decryption cost will increase 2 and will be 1008 USD

We present you a special software that will allow you to decrypt your files.

How to buy the Decryption Tool?
1. You can pay using Bitcoin, getting them by the way most convenient for you.
2. You need to create a Bitcoin-wallet (e-wallet or other method).
3. Buy Bitcoin on one of the trading platforms.
4. Send 1.2 BTC to Bitcoin address.
5. Enter the ID of your Bitcoin-transaction.
6. Please check payment information you mentioned and click on “PAY” (Attention! Do not provide incorrect information! Otherwise, the payment amount will be increased by several times, or your account will be blocked!)

The price initially asked is 1.2 BitCoins, which equals a sum of about 500 US dollars. You will have up to five days or to a week to pay. If you don’t make a payment, the price increases, but there is no threat that your files are going to be erased or lost.

Do NOT pay the notorious cyber criminals. They show no signs of stopping and paying them will only get them what they want. The more money they collect, the bigger stimulus they have to make their ransomware stronger. Users have reported to us that they have paid the ransom and received non-working keys.

Researchers from Kaspersky and TrendMicro have developed free decrypt tools for previous variants of the ransomware, and we expect that they will update their tools. If not, hopefully, other researchers rise and make a new such tool.

The Crypz ransomware encrypts files with the extensions encrypted by CryptXXX 3.0:

→.3dm, .aes, .ARC, .asc, .asf, .asm, .asp, .avi, .bak, .bat, .bmp, .brd, .cgm, .class, .cmd, .cpp, .crt, .csr, .CSV, .dbf, .dch, .dcu, .dif, .dip, .djv, .djvu, .doc, .DOC, .docb, .docm, .docx, .DOT, .dotm, .dotx, .eml, .fla, .flv, .frm, .gif, .gpg, .hwp, .ibd, .jar, .java, .jpeg, .jpg, .key, .lay, .lay6, .ldf, .max, .mdb, .mdf, .mid, .mkv, .mml, .mov, .mp3, .mp4, .mpeg, .mpg, .ms11, .MYD, .MYI, .NEF, .obj, .odb, .odg, .odp, .ods, .odt, .otg, .otp, .ots, .ott, .PAQ, .pas, .pdf, .pem, .php, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .PPT, .pptm, .pptx, .psd, .qcow2, .rar, .raw, .RTF, .sch, .sldx, .slk, .sql, .SQLITE3, .SQLITEDB, .stc, .std, .sti, .stw, .svg, .swf, .sxc, .sxd, .sxi, .sxm, .sxw, .tar, .tar, .bz2, .tbk, .tgz, .tif, .tiff, .txt, .uop, .uot, .vbs, .vdi, .vmdk, .vmx, .vob, .wav, .wks, .wma, .wmv, .xlc, .xlm, .xls, .XLS, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .zip, .zipx

STF-crypz-ransomware-virus-cryptxxx-variant-.crypz-extension-encrypted-file

The extension list may have new additions with the new variant, but the previous extensions are surely still being encrypted. After the encryption process is done, all files found on your PC and network will get a second extension added as their appendix – .crypz.

Crypz ransomware deletes Shadow Volume Copies from Shadow Explorer in the Windows Operating System same as previous variants of the ransomware do.

Malware researchers came up with free decrypt tools for previous variants of the ransomware – you can read more about it in the Cryp1 (UltraCrypter) article. Continue reading further, to see what you can try doing about the file decryption while we wait for a fully working decrypt software.

Remove Crypz Ransomware and Restore .Crypz Files

If your computer got infected with Crypz, you should have some experience in removing viruses. You should get rid of Crypz ransomware as soon as possible because it will keep encrypting files. What’s worse, if not dealt with, the ransomware virus will infect others over your network. The recommended thing to do is to remove the virus and follow the step-by-step instructions guide provided here.

Manually delete Crypz Ransomware from your computer

Note! Substantial notification about the Crypz Ransomware threat: Manual removal of Crypz Ransomware requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Crypz Ransomware files and objects.
2. Find malicious files created by Crypz Ransomware on your PC.
3. Fix registry entries created by Crypz Ransomware on your PC.

Automatically remove Crypz Ransomware by downloading an advanced anti-malware program

1. Remove Crypz Ransomware with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by Crypz Ransomware in the future
3. Restore files encrypted by Crypz Ransomware
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

  • abhinav

    Hi,
    I got my laptop by virus attack, due to that all files got converted into some known format called .crypz.
    Kindly let me know, how i will get my data back. All files are encrypted by Crypz ransomware . can I get back my data again.I am try recovering method to get the data but failed to get back my data, if their is any method to get my data or any decrypting program please suggest me and also give solution for this ransomware attack .
    I have question, Can ransom only encrypt data or else they can do also collect the data?

    • Hi abhinav,

      Unfortunately, some crypto viruses may also employ infostealers. There is no telling what cyber criminals will do with your data once it is in their hands.

      What recovery method have you tried so far?

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.