Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


.stn File Virus Restore Files (Satan 2 Ransomware)

This article is created to help you remove the 2nd version of Satan ransomware from your computer and restore .stn files encrypted by this ransomware.

A new version of Satan ransomware, detected out in the wild was released. The virus was first detected back in January the 19th and was reported to use Tor networking for the ransom instructions and payoff. This version uses directly leaves the e-mails [email protected] or [email protected] in it’s ransom note, named “0_HELP_DECRYPT_FILES.html” in which it demands 1 bitcoin to be paid in 24 hours otherwise the sum will double. In case you have become a victim of the .stn file virus, recommendations are to read this article thoroughly.

SensorsTechForum team is currently performing an ongoing investigation on Satan 2 ransomware. Expect an update on this article.

Threat Summary

Name .stn File Virus
Type Ransomware
Short Description The ransomware is put on the Web as a service (RaaS). It is also free to use, while it requires only a registration.
Symptoms The ransomware encrypts files and will place the same .stn extension to all files after encryption finishes. Also drops a ransom note, named 0_HELP_DECRYPT_FILES.html.
Distribution Method Spam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .stn File Virus

Download

Malware Removal Tool

User Experience Join Our Forum to Discuss .stn File Virus.
Data Recovery Tool Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Satan 2 Ransomware – How Does It Infect

The infection process of Satan ransomware is no different than the first version. The virus still uses spam e-mail messages with instructions in them to open the attachments, just like the example image below displays:

In the attachment there may be a document portrayed by the e-mail message to be an important invoice or other type of document that should be opened right away.

Besides spam mail, there may be multiple other methods via which this ransomware infection could be replicated and one of them Is if the infection has embedded loader that appears like a game patch, program legitimizing software or a fake setup of software. Such are usually uploaded online on suspicious websites or via hacked account on torrent websites.

Whatever the scenario, once the user opens the malicious file, the payload of the Satan 2 ransomware is dropped on the computer of the user. It consists of the following files:

→ 0_HELP_DECRYPT_FILES.html
Ransomware.exe
Ransomware3.exe
Ransom.exe

.stn File Virus – Malicious Activity

The activity of the .stn ransomware involves multiple different actions, the first of which may be to delete the shadow volume copies on the infected computer. For this, the following commands in Windows Command Prompt are likely used:

→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

After this, the Satan 2 ransomware may begin to interfere with the Windows Registry editor, more specifically set multiple different malicious files to run when Windows starts up. This is achievable by modifying the following Windows registry sub-keys:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

In addition to this, the Satan ransomware variant using the .stn extension may also shut down or interfere with multiple critical Windows objects, like the following:

→ KERNEL32.dll
ADVAPI32.DLL

.stn File Virus – Encryption Activity

For the encryption process, this iteration of Satan Ransomware may use the AES-256 and RSA-2048 encryption algorithms. The AES cipher may be employed in order to encrypt the files themselves, generating symmetric decryption key. The RSA cipher then may be additionally employed to generate a public key assigned to the user and embed it within the files.


Image Source: Wikipedia

Satan 2 ransomware is believed to scan for and look for the following file types to encrypt:

→ .incpas, .mp4, .pab, .st6, .sas7bdat, .wmv, .backup, .drf, .ibank, .3ds, .odg, .cer, .tif, .cs, .dotx, .7z, .png, .bak, .ibz, .db3, .pbl, .3fr, .dxf, .nk2, .bkp, .mdf, .svg, .xlm, .3dm, .pct, .java, .pot, .sxi, .ibd, .sxw, .pspimage, .ppt, .kbx, .ppsm, .ndd, .txt, .pdb, .say, .backupdb, .fla, .swf, .asx, .accdt, .mp3, .ycbcra, .erf, .cr2, .pfx, .potx, .qby, .sqlite, .blend, .class, .pat, .odp, .gray, .qbw, .tib, .thm, .htm, .mos, .rm, .key, .std, .tlg, .lua, .pst, .sqlitedb, .grey, .cdr4, .dc2, .ce1, .ps, .tex, .eml, .xlam, .pages, .st8, .jar, .st7, .potm, .sdf, .db-journal, .pcd, .aspx, .rwl, .kpdx, .fmb, .xlr, .gry, .kc2, .oil, .moneywell, .xlk, .sti, .accdr, .oth, .c, .xml, .nd, .mdb, .pem, .erbsql, .bpw, .ffd, .ost, .pptm, .dwg, .zip, .qbm, .cdx, .des, .dng, .pdd, .cfp, .nyf, .cgm, .sldm, .xla, .odf, .raf, .crw, .mef, .raw, .x11, .nsd, .fff, .design, .dcs, .ptx, .al, .ns2, .bik, .back, .accdb, .nwb, .cpi, .ads, .odt, .sqlite3, .docm, .drw, .pl, .nx2, .fpx, .rdb, .otp, .msg, .accde, .agdl, .php, .csv, .py, .rtf, .ach, .sda, .ddd, .asf, .dotm, .cmt, .h, .hbk, .xlsx, .s3db, .tga, .wav, .iif, .dxb, .sql, .db, .sd0, .bgt, .djvu, .jpg, .doc, .craw, .mpg, .sxd, .kdc, .jpeg, .psafe3, .flac, .dtd, .act, .qba, .vob, .cdrw, .eps, .bkf, .mdc, .rar, .mov, .cdf, .m4v, .ab4, .bank, .pps, .cib, .dot, .dgc, .exf, .flv, .xlsb, .ddrw, .adb, .srw, .plc, .csh, .xls, .fxg, .otg, .pas, .xlt, .indd, .rwz, .xltx, .apj, .stw, .xltm, .orf, .ott, .qbb, .max, .cls, .obj, .docx, .dcr, .cdr3, .qbx, .pdf, .nef, .ots, .srt, .ddoc, .rat, .phtml, .m, .dbx, .nxl, .avi, .p12, .awg, .dbf, .ns3, .mmw, .prf, .wallet, .rw2, .jin, .odc, .qbr, .ppsx, .ns4, .wpd, .wps, .nsh, .dxg, .fhd, .dac, .wb2, .nrw, .odb, .ait, .jpe, .odm, .sldx, .fdb, .acr, .war, .oab, .sxc, .cpp, .r3d, .hpp, .asm, .st5, .stx, .xis, .dds, .xlsm, .p7c, .cdr5, .3g2, .mrw, .sr2, .html, .cdr, .idx, .st4, .bdb, .kdbx, .nsg, .der, .ods, .myd, .nop, .ppam, .pptx, .yuv, .xlw, .mfw, .nsf, .csl, .php5, .p7b, .crt, .asp, .srf, .jsp, .cdr6, .sxm, .iiq, .3gp, .ce2, .arw, .bay, .ai, .sxg, .psd, .3pr, .fh, .pef, .x3f, .sik, .bpp, .vmdk, .spi, .bup, .cvt, .bb, .fkc, .tjl, .dbk, .swp, .fb, .vib, .dtb, .bke, .old, .bkc, .jou, .rpb, .abk, .sav, .bkn, .tbk, .fbw, .vrb, .spf, .bk, .sbk, .umb, .ac, .vbk, .wbk, .mbk

After the encryption process by Satan ransomware has completed, the ransomware infection appends the .stn file extension to the files encrypted by it. The files appear like the following:


Source: Affected user

In addition to this, the ransom note of the ransomware is also dropped on the computer of the victim, this time directly directing the victim to pay the BitCoin address, instead of utilizing the Tor network for the ransom payoff:

Ransom note’s content:

What happened to my files ?
All of your personal files were encrypted using AES-256 and RSA-2048
Your personal ID

{custom key}

What does this mean ?
This means that the content of your files have been changed, you will not be able to use them, it is basically the same as losing them forever. However, you can still get them back with our help.
How can I get my files back ?
As said before, your files have been encrypted, in order to decrypt them, you’ll need the private key of the key pair that was generated when your files were encrypted. Decrypting your files is only possible with the private key and the decrypter.
To get the decryptеr you should:
pay for decrypt:
to send 1 bitcoin today (tomorrow 2 bitcoins) to bitcoin the address 1Nez7W9ashFL4BA7vHuA5aoaad9XtqHKCF
Here are our recommendations:

If you have no Bitcoin address register https://blockchain.info/wallet
fill up your wallet some of the ways:
Btcdirect.eu – Good service for Europe
Bittylicious.com – Bitcoins through Visa / MC or through SEPA (ЕС) transfer
Localbitcoins.com – Here you can find people who want to sell Bitcoins directly (WU, in cash, SEPA, Paypal u.s.).
Cex.io – buy bitcoins with Visa / Mastercard or Wire Transfer.
Coincafe.com – Designed for quick and easy service. Payment methods: Western Union, Bank of America, cash by FedEx, Moneygram, as money transfer
Bitstamp.net – well known and established Bitcoins seller
Coinmama.com – Visa / Mastercard
Btc-e.com – Bitcoins vendor (Visa / Mastercard, etc.)
If you have not found any bitcoins in your region, try to find them here:
Buybitcoinworldwide.com – International Bicoins Exchange Directory
Bitcoin-net.com – Another directory of Bitcoins sellers
Howtobuybitcoins.info – International Bicoins Exchange Directory
Bittybot.co/eu – Directory for countries of the European Union
write to Google how to buy Bitcoin in your country?

mail support [email protected] or [email protected]:
After the payment:

Send screenshot of payment to mail support [email protected] or [email protected] In the letter include your personal ID (look at the beginning of this document).
After you will receive a decryptor and instructions
Attention!

No Payment = No decryption
You really get the decryptor after payment
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, because each user’s unique encryption key

Remove Locky Remove Satan 2 Ransomware and Restore .stn Encrypted Files

For the removal process of Satan 2 ransomware infection, it is strongly advisable to backup the files encrypted by this virus. After this has been completed, recommendations are to follow the removal instructions below. They are created in order to help with the proper removal of the ransomware by isolating it first. In case manual removal is a challenge for you, recommendations are to focus on performing automatic removal with an advanced anti-malware program which will delete every file associated with Satan 2 ransomware and protect your computer from such threats in the future as well.

In case you want to restore encrypted files by Satan 2 ransomware, recommendations are to follow the alternative methods we have posted in step “2. Restore files encrypted by Satan 2” below. They may not be 100% effective in restoring your files, but may restore at least some of them until a decryptor is released for this infection.

Manually delete .stn File Virus from your computer

Note! Substantial notification about the .stn File Virus threat: Manual removal of .stn File Virus requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove .stn File Virus files and objects
2.Find malicious files created by .stn File Virus on your PC

Automatically remove .stn File Virus by downloading an advanced anti-malware program

1. Remove .stn File Virus with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by .stn File Virus
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.