There is a new variant of the Trojan.Ransomcrypt infection. It is called Trojan.Ransomcrypt.X and is classified both as Trojan and ransomware. This ransomware searches for files with specific extensions and then encrypts them. In the ransom message, the payment option for getting a decryption key is in BitCoins.
|Short Description||The ransomware encrypts specific files with commonly used extensions and asks for BitCoins to decrypt them.|
|Symptoms||Files get encrypted and become unusable. A ransom message shows and locks the screen.|
|Distribution Method||Spam Emails, Email Attachments, Suspicious Sites|
|Detection tool||Download Malware Removal Tool, to See If Your System Has Been Affected by Trojan.Ransomcrypt.X|
|User Experience||Join our forum to discuss Trojan.Ransomcrypt.X.|
Picture source: Symantec
Trojan.Ransomcrypt.X Ransomware – Spread
Usually Trojan.Ransomcrypt.X is known to be spread via malicious email attachments and spam emails. You may receive an email with a malware file attached. If you open the attachment, the malware is released. Malicious code may be hidden inside the body of the email, so even if you just open such an email, you can get infected, without even clicking on an attachment.
Around the Internet, social networks and file sharing services, there may be similar attachments and files containing the Trojan.Ransomcrypt.X ransomware, disguised as a useful application or something else. Opening suspicious websites and redirects may lead to malware.
Trojan.Ransomcrypt.X Ransomware – Details
Trojan.Ransomcrypt.X is classified both as a Trojan and ransomware. That is because, it is presented as something useful, but it is malicious. After getting on your PC and before the encryption process, it does some other malicious actions. First it spreads multiple text file copies of the ransom message that bear the name READ_ME.txt.
The Trojan horse belongs to the Ransomcrypt family, as the following examples:
It is a bit different than them, although the end result is the same – your files get encrypted and you are asked to pay money for their retrieval. There are a few steps that Ransomcrypt.X takes before it starts encrypting files. The first step after spreading copies of the readme file with the ransom note begins with modifying a registry entry so it loads with every start of Windows:
It continues with modifying more registry entries, so that Windows Task Manager cannot be started:
→HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\”DisableTaskMgr” = “1”
It also monitors the Windows Task Manager and its associated process and makes sure it is shut down.
Then, Trojan.Ransomcrypt.X is known to search for and encrypt files with these extensions:
→ .asp, .aspx, .csv, .doc, .docx, .html, .jpg, .js, .mdb, .odt, .pdf, .php, .png, .ppt, .pptx, .psd, .sln, .sql, .txt, .xls, .xlsx, .xml
After the files are encrypted, Trojan.Ransomcrypt.X shows up the ransom note while your screen is being locked. You are asked to pay ~0.32 BitCoins for the decryption key, which equals around $130 as an initial price. Along with the message, there is a QR code that when scanned displays on what web address you should pay the ransom. We advise you NOT to do that because there is absolutely no guarantee that you will even get any response from the cyber criminals, let alone a decryption key.
The easiest and most efficient way to restore your files from ransomware remains to be Backups. After removing the threat, you can use a backup, if you have any, to restore your data.
- Shadow Volume Copies
Currently, there is no information if Shadow Volume Copies are deleted from the Windows OS. So, after removal, you should check the 5th section of the instructions written down below for several ways in which you can try to restore your files.
Trojan.Ransomcrypt.X Ransomware – Removal
If you have been infected by the Trojan.Ransomcrypt.X ransomware, you should have at least a bit of experience in removing malware. This ransomware can irreparably lock your files, so it is highly recommended that you act fast and follow the instructions provided below: