Hey you,

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:

Remove Masterlock@india.com Ransomware Virus and Restore .Crypt Encrypted Files

help-removal-sensorstechforumRansomware Virus, belonging to the “@” ransom variants has been reported to encode user files and add a custom file extension to them. It also leaves the email by which victims can contact the cyber-outlaws – masterlock@india.com. Once contacted the victims receive instructions on how to pay the sum of 3 BitCoins which is approximately 1600 USD at the time of writing and receive a decryption key. Since some infected users have managed to restore their files using a Kaspersky decryption program, we strongly advise to read this article, remove Masterlock ransomware and try to restore the files yourself.

Threat Summary



Type Ransomware
Short Description The malware encrypts users’ files and then leaves its e-mail to extort them for granting access to the encrypted files.
Symptoms The user may witness an extension with an e-mail, unique id and .crypt word in it. The cyber-criminals send a ransom message demanding 3 BTC as a payoff.
Distribution Method Via an Exploit kit or a malicious Java Script.
Detection Tool See If Your System Has Been Affected by masterlock@india.com


Malware Removal Tool

User Experience Join our forum to Discuss Cerber Ransomware.

Masterlock@india.com – Distribution Mechanisms

How does one ransomware infect users is the most important part of the infection process. Similar to helpme@freespeechmail.com ransomware, the criminals behind masterlock@india.com are reported to use spam e-mail messages that may contain different information, for example:

“Subject: Holiday Property
We have successfully purchased your property located at:
We can provide free listings of the property on our website.
Please check the receipt for more information:
Holiday Properties Inc.”

Such malicious e-mails may either activate an Exploit Kit or a malicious JavaScript which can download the malware directly onto the infected user’s computer.

Masterlock@india.com Ransomware – Detailed Overview

The malware may use a so-called process obfuscators to hide its malicious .exe file, an activity noticed with another of its variants – file2@openmailbox.org. Besides the main malicious file, it may also create files of the following types:

→ .dll, .tmp, .vbs, .bat, .cmd, .reg

Such files may be placed in one or multiple Windows locations:

  • %AppData%
  • %Documents%
  • %Windows%
  • %Local%
  • %Roaming%
  • %Temp%

The masterlock@india.com ransomware may also create a registry entry to have it’s encryption process run every time the user starts Windows:

→ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\”{Malicious File’s name}.exe” = ” {Location of the file}

When the encryption process is initiated, the ransomware looks for the most commonly used files, associated with videos, photos, databases, audio files, documents and others, for example:


Each file It detects is encrypted, using one of the following encryption ciphers:

  • AES-128
  • AES-256
  • AES-512
  • RSA-1024
  • RSA-2048

After encrypting the files, they become unusable and masterlock@india.com ransomware ads a custom ID, the e-mail and .crypt as an extension of the encrypted file, for example:

→ New Text Document.txt.id-13yy81hd01h0.masterlock@india.com.crypt

When the desperate user contacts the cyber-criminals via the masterlock@india.com e-mail address, they may send the following message as a reply:

→ “Hello, dear friend!
We are writing to inform you that our team of network security specialists has analyzed your system and has identified vulnerabilities in the protection.
We kindly draw your attention that defensive operation on your computer is not running properly and now the whole database is at risk.
All your files are encrypted and can not be accepted back without our professional help.
Obviously vulnerability analysis, troubleshooting, decoding the information and then ensuring safety are not a simple matter.
And so our high-grade and quick service is not free.
Please note that today the price of your files recovery is 3 Bitcoins, but next day it will cost 5 Bitcoins.
You should buy bitcoins here https://localbitcoins.com/faq
Read the paragraphs:
1. How to buy Bitcoins?
2. How do I send Bitcoins and how can I pay with Bitcoins after buying them?
The Bitcoin wallet for payment is 12yDGpp82ejLqT6GbE4qAPtCYAKRpksbWd
After the transfer of bitcoins please send email with screenshot of the payment page.
We does not advise you to lose time, because the price will encrese with each passing day.
As proof of our desire and readiness to help you, we can decipher a few of your files for test.
To check this you can upload any 1 encrypted file on web site dropmefiles.com, size no more than 10 MB (only 1 text file or a photo) and send us a download link.
Certainly after payment we guarantee prompt solution of the problem, decrypt the database to return to its former condition and consultation how to secure the rules of the system safety.
Kind regards, Master Lock.” Source:Infected User

This type of ransom messages are often referred to as fake tech support helpers. They are specific because instead of threatening the user, they pretend to be the solution. It is particularly useful against users with less experience especially when it comes to ransomware.

Furthermore, this ransomware even offers to decrypt 1 file which is up to 10 MB for free, to show to the user who is in control and what “must” be done to get the files back. However, security experts strongly advise against paying the ransom and dealing with the threat via a different approach.

Remove Masterlock@india.com Ransom Virus and Restore Your Files

To remove this ransomware, all you should do is follow our instructions below. They will help you discover the malicious files and registry objects belonging to Masterlock@india.com ransomware. In case you are having difficulties in manually discovering the malicious objects, experts recommend using an advanced anti-malware tool and scanning your computer in safe mode, as shown below. This will help automatically detect everything associated with the virus and remove it surgically without affecting your files.

In case you wish to restore your files, we strongly advise following the instructions of step “3. Restore files encrypted by Masterlock@india.com” below. From those instructions, we recommend running the Rannoh Decrypter by Kaspersky since this ransomware belongs to the Rannoh variants. If one file does not work with the decrypter, be advised that you should keep trying with different files until you find a password (key) with which you can restore the other locked files as well. We also recommend that you choose files with smaller sizes first and set your computer to be always awake and not to automatically Hybernate or Sleep since the decryption process may take from hours up to days.

Manually delete masterlock@india.com from your computer

Note! Substantial notification about the masterlock@india.com threat: Manual removal of masterlock@india.com requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove masterlock@india.com files and objects
2. Find malicious files created by masterlock@india.com on your PC
3. Fix registry entries created by masterlock@india.com on your PC

Automatically remove masterlock@india.com by downloading an advanced anti-malware program

1. Remove masterlock@india.com with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by masterlock@india.com in the future
3. Restore files encrypted by masterlock@india.com
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.