Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove Ultracode Ransomware and Restore .ultracode Files

Created around three years ago, Ultracode ransomware is still causing infections. It seems that it locks the user files adding .ultracode file extension to them. The ransomware then leaves a ransom message pointing out the user with “instructions” on how to pay off the cyber crooks in return for the decryption of the data. However, it is strongly advisable not to and try other methods to restore your files instead.

Name Ultracode
Type Ransomware
Short Description Ultracode ransomware encrypts user files and requests a payment to retrieve them.
Symptoms The user may witness his files to have the .ultracode file extension leaving a ransom note with payment instructions
Distribution Method Via malicious URLs or attachments and a Trojan.Downloader
Detection Tool Download Malware Removal Tool, to See If Your System Has Been Affected by Ultracode
User Experience Join our forum to discuss Ultracode.

ultracode-ransomnote

Ultracode Ransomware – How Does It Spread?

This old ransomware is the perfect example that crypto-malware can still spread with the same proportions as a new one. All that is needed is good obfuscation of the payload and a good Trojan horse to drop it onto the computer. These may usually distribute either via drive-by downloads caused by malicious web links or archived attachments in spam email. Such spam mails may pretend to be a legitimate service assisting users with non-existent problems’ like:

  • Their account has been suspended.
  • They have an incoming transfer.
  • They have been banned from a service.

Either way, users should beware, and we strongly advise using malicious URL blocking as well as external mail software that has spam blocking enabled to prevent such attacks in the future.

Ultracode Ransomware In Detail

This ransomware may act in two stages:

Stage 1: Infection and Encryption

Once on the user PC, the ransomware may create one or more files of the following file formats:

  • .dll, .exe, .tmp

The file names may resemble a program, a game or have completely random names:

  • 230rh190h23.exe
  • ET5557293774.dll
  • Notepad.exe
  • steamapps.tmp

In addition to that, the malware may create a registry entry so that the payload starts when you start Windows. The key targeted for that is:

  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run

After doing so, the ransomware may start scanning all of the important user data and encrypt the files adding a .ultracode extension to them:

crypted-sensorstechforum-ultracode-ransom

Stage 2: Notifying the User

Ultracode adds a ransom note in the form of a text file, named “HOW TO DECRYPT FILES.txt”. It has the below-mentioned scareware instructions. Such instructions aim to scare away users into paying ransom money to cyber crooks by extorting them with a deadline and conditions.

txt-files-sensorstechforum

→ “If you’re seeing this text file, then ALL your FILES are BLOCKED with the most strongest military cipher.
All your data – documents, photos, videos and backups – everything in ENCRYPTED.
The only way to recover your files – contact us via ultracode@tormail.org
Only WE have program that is able to completely recover YOUR files.
Attach to E-MAIL:
1. Text file with your code (“HOW TO DECRYPT FILES.txt”)
2. One encrypted file (please dont send files bigger than 1 MB)
We will check your code from text file and send to you OUR CONDITIONS and your decrypted file as proof that we have decryptor.
Remember: the faster you’ll CONTACT US – the FASTER you will RECOVER YOUR files.
===================
{1st Random Key}
{2nd Random Key}
{3rd Random Key}
{4th Random Key}
{5th Random Key}
====================”

Instructions for Removing Ultracode Ransomware and Restore .ultracode Files

We have seen many crypto-malware such as “.ultracode” and eventually, for most of them, a solution is usually discovered sooner or later. This is why we advise NOT to pay the cybercriminals money. First, there is no guarantee you will get your files back. Second, you fund them to develop further the malware.

We strongly advise to follow the aftermentioned instructions and to try to go around the ransomware instead of directly trying to decrypt your files. Also, it is recommended not to wipe your PC clean since there might be a chance to restore your data using file recovery software. Finally, before attempting any recovery, make sure to try and remove the malware. One method to do it is by using an advanced anti-malware software.

1. Boot Your PC In Safe Mode to isolate and remove Ultracode
2. Remove Ultracode with SpyHunter Anti-Malware Tool
3. Back up your data to secure it against infections and file encryption by Ultracode in the future
4. Restore files encrypted by Ultracode
Optional: Using Alternative Anti-Malware Tools
NOTE! Substantial notification about the Ultracode threat: Manual removal of Ultracode requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.