Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove SNS Locker and Restore .RSNSLocked AES-256 Files

SNSLocker-Wallpaper-sensorstechforum2Malware researchers have discovered a new ransomware, calling itself SNS Locker. The new enciphering malware encrypts files with .RSNSLocked file extension and uses a strong AES-256 encryption algorithm to encode a wide variety of files on the compromised computer. The ransomware then changes the wallpaper of the user with a random scary pic, notifying him to pay money to get his files back. The ransomware asks for 0.66 bitcoins which are approximately 300$.

Threat Summary

Name SNS Locker
Type Ransomware
Short Description The ransomware encrypts files with the RSA algorithm and AES cipher and asks a ransom for decryption.
Symptoms Files are encrypted and become inaccessible. A ransom note with instructions for paying the ransom shows as Wallpaper and a notification window.
Distribution Method Spam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by SNS Locker

Download

Malware Removal Tool

User Experience Join our forum to Discuss SNS Locker.

SNS Locker – Distribution

Malware researcher Mosh at Nyxbone.com has researched the ransomware and has established that In order to be successfully distributed out into the open SNS Locker is believed to be spread out via an SNS Locker.exe and SNSLOcker2.exe files with the following parameters:

→ “File name: SNSLocker.exe / Size: 635.0 KB / VT
MD5: c3cd8168f96e89998cab52b436c24b7d
SHA1: 3cbe96abba5269eb69093ebc07dd82e3091f0d3d
SHA256: 503b7d7a1348c3f03c789a5faca481bcd340e9be7cc602175fcbe513e864ffb8
FileName: SNSLOcker2.exe / Size: 796.0 KB / VT MD5: 3a27b49845a3ae4671fa69c2051c2cb6 SHA1: 71caed58a603d1ab2a52d02e0822b1ab8f1a9095 SHA256: 597a14a76fc4d6315afa877ef87b68401de45d852e38f98c2f43986b4dca1c3a”Source: Nyxbone.com

This executable may assume different names to be undetected manually, for example:

  • {random name}.exe
  • Svchost.exe
  • Notepad.exe
  • Your Confirmation.exe
  • Receipt.exe

It may be spread out via game cracks, other keygens, activators, malicious email messages sent out as spam and even by malicious links that have come up as a result of an adware causing redirects to them, such as DNS Unlocker, for example.

SNS Locker Ransomware In Detail

Researchers at Nyxbone blog have established that the SNS Locker ransomware heavily modifies the computers it infects. For starters, once executed, the ransomware connects to the following C&C(Command and Control) IP address:

→ 5.9.82.18

The address appears to be based in Germany, and after SNS Locker connects to it, it immediately sends the following information from the infected computer:

  • Customly generated 8 character ID of the victim. (For example – yas9yc92)
  • Machine name.
  • Username.
  • Public IP address.
  • MAC Address.
  • Date.

The ransomware then begins to encrypt the files of the infected computer. It is reported to look for the following file types to encode:

→ .1pa, .3dm, .3g2, .3gp, .aaf, .accdb, .aep, .aepx, .aet, .ai, .ai, .aif, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bik, .bmp , .c, .cal, .cdr, .cdt, .cdx, .cgn, .class, .clk, .cmx, .cnt, .cpp, .cpt, .cpx, .cs, .csl, .csv, .cur, .dat, .db, .dbf, .des, .des, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .drw, .ds4, .dsf, .dwg, .dwg, .dxf, .efx, .eps, .eps, .fim, .fla, .flv, .fmv, .fpx, .fpx, .fx0, .fx1, .fxr, .gem, .gif, .gif, .h, .idml, .iff, .iif , .img, .indb, .indd, .indl, .indt, .ini, .inx, .iso, .jar, .java, .jpeg, .jpg”, .js, .lgb, .m3u, .m3u8, .m4u, .mac, .max, .mdb, .met, .mid, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .mx0, .nap, .nd, .pat, .pcd, .pct, .pcx, .pdb, .pdf, .pfb, .php, .pic, .plb, .plt, .pmd, .png, .pot, .potm, .potx, .pp4, .pp5, .ppam, .ppf, .ppj, .pps, .ppsm, .ppsx, .ppt, .ppt, .pptm, .pptx, .prel, .prn, .prn, .prproj, .ps, .ps, .ps, .psd, .psp, .ptb, .py, .qba, .qbb, .qbi, .qbm, .qbo, .qbp, .qbr , .qbw, .qbx, .qby , .qpd, .qsm, .qss, .qst, .qwc, .ra, .rar .raw, .raw, .rb, .rif, .rtf, .rtp, .sct, .sdf, .ses, .set, .shw, .sldm, .sldx, .sql, .svg, .svg, .swf, .swf, .tga, .tif, .tiff, .tlg, .tlg, .ttf, .txt, .txt, .txt, .v30, .vcf, .vob, .vsd, .vsd, .wav, .wav, .webm, .wi, .wk3, .wk4, .wma, .wmf, .wmv, .wpd, .wpd, .wpg, .wps, .xcf, .xla, .xlam, .xll, .xlm, .xls, .xls, .xlsb, .xlsm, .xlsm, .xlsx, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xpm, .xqx, .xqx, .zip Source:Nyxbone

The discovered files are encoded immediately with two of the most powerful ciphers in the world:

  • AES cipher to encrypt the files on the compromised computer.
  • RSA algorithm to encode the public AES key which is being sent to the criminals’ IP address.

The malicious software then changes the wallpaper image of the victim user to a terrifying picture, that may look like the following:

SNSLocker-Wallpaper-sensorstechforumSource:Nyxbone

After this has been done, SNS Locker may automatically open a window with the ransom note and a method to decrypt the files by paying in BitCoin. It looks like the following:

SNSLocker-Ransom-note-sensorstechforumSource:Nyxbone

SNS Locker also shows the user his own unique identification number which is most likely made to help the cyber-criminals identify multiple devices easily. Along with the number there is a button which may directly transfer the user to a payment page:

SNSLocker-unique-ID-sensorstechforumSource:Nyxbone

The payment page is rather simply created. It features the bitcoin address of the cyber-criminals in an electronic invoice which the user can pay online, from distance:

SNSLocker-payment-page-sensorstechforumSource:Nyxbone

After the funds have been paid, the user may receive a link from the malicious domain of the cyber-criminals where he or she can find his private and public keys and click on the “Decypher” button to decrypt them:

decypher-sensorstechforum-snslocker

SNS Locker – Conclusion, Removal, and Decryption Alternatives

The bottom line for SNS Locker is that it is basically a highly sophisticated ransomware which aims to basify the payment method for infected users, by being more “user-friendly”. This is a very effective method and it may have already made the cyber-criminals behind SNS Locker a lot of money. Despite that, malware researchers strongly advise hopeless users NOT to pay any ransom money due to the following possibilities:

  • You fund the cyber-crooks to infect even more computers.
  • You may not get your files back 100%.

To remove this ransomware effectively from your computer, we advise following the Manual or Automatic removal steps below. Experts also advise downloading a reputable anti-malware program which will automatically take care of the SNS Locker files for you.

Regarding file restoration, be advised that we have prepared some alternative methods in step “3” below that you may try while we investigate any decrypters which are publicly released and working. As soon as there is a solution, expect an update on this article’s web page.

Manually delete SNS Locker from your computer

Note! Substantial notification about the SNS Locker threat: Manual removal of SNS Locker requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove SNS Locker files and objects
2.Find malicious files created by SNS Locker on your PC
3.Fix registry entries created by SNS Locker on your PC

Automatically remove SNS Locker by downloading an advanced anti-malware program

1. Remove SNS Locker with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by SNS Locker in the future
3. Restore files encrypted by SNS Locker
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.