Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Cradle Ransomware – Remove It and Restore .Cradle Files

This article will aid you to remove the Cradle ransomware absolutely. Follow the ransomware removal instructions provided at the bottom of this article.

Cradle ransomware is a cryptovirus. The extension it puts to all files after encryption is .cradle. A ransom note named _HOW_TO_UNLOCK_FILES_.html points to a TOR-based Web page, which contains instructions about payment. The sum of 0.25 Bitcoins is demanded from the cybercriminals for paying the ransom. Read on through and find out what ways you could try to potentially recover some of your files and data.

Threat Summary

NameCradle
TypeRansomware
Short DescriptionThe sransomware encrypts files on your computer system and it shows a ransom note afterward.
SymptomsThis ransomware virus will encrypt your files and place the .cradle extension on each one of them.
Distribution MethodSpam Emails, Email Attachments, Executables
Detection Tool See If Your System Has Been Affected by Cradle

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Cradle.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Cradle Ransomware – Delivery Tactics

The Cradle ransomware might be delivered by utilizing different tactics. The payload dropper file which initiates the malicious script for the ransomware is found to be circling the Internet. Malware researchers have not yet seen a live sample, so no specific analysis exists of that particular executable file that contains the payload script.

The Cradle ransomware might be using other ways to deliver the payload file, in question, such as social media sites or file-sharing services. Freeware applications found on the Web could be promoted as helpful but also could hide the malicious script for this virus. Before opening any files after you have downloaded them, you should instead scan them with a security program. Especially if they come from suspicious places, such as emails or links. Also, don’t forget to check the size and signatures of such files for anything that seems out of place. You should read the ransomware preventing tips given in the forum.

Cradle Ransomware – Technical Information

The Cradle ransomware is a cryptovirus, which is still sought by malware researchers for a deeper analysis. When the Cradle ransomware encrypts your files it will place the .cradle extension to every encrypted file.

The Cradle ransomware might make new registry entries in the Windows Registry to achieve a higher level of persistence. Those entries are usually designed in a way that will start the virus automatically with every launch of the Windows Operating System, like in the example provided below, such as the example given down here:

→“HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run”

A ransom message will be placed inside your computer system right after the encryption process is complete. The ransom note file is called _HOW_TO_UNLOCK_FILES_.html and it contains a link to a TOR Web page. Once you open that page, this is the message that will load on it:

That ransom message with instructions reads the following:

Unlock Your Files
You are here because your files are locked with military-grade encryption! To unlock your files you must purchase the decryption software. It is the only way to restore your files.
As soon as payment is received, a software download button will appear on this page. Only software from this site can unlock vour files! To bookmark this page press [Ctrl+D].
Payment ID: 5X9
Website: https://pn6fsoQSzhQlxz4n.onion.to/5X9
Price: 0.25 Bitcoins
Bitcoin Address: lKhk3pcJGYSnBmPF3D3JyblA5yh8ztHN7P
Time Left: 3 days, 11 hrs 28 mins 33 secs

Follow these instructions carefully:
1. Payment must be made in Bitcoin currency. No other form of payment is accepted.
2. Time is running out! The price will double when the time expires!
3. After 14 days of nonpayment, vour files will be locked forever!!!
4. DO NOT attempt to restore the files yourself! You WILL destory them if you try.
5. Purchase 0.25 Bitcoins and send to 1Khk3pcJGYSnBmPF3D3JyblA5yh8ztHN7P
6. Return to this page and download the software.
7. Confirmation of payment can take up to 1 hour. Be patient and check back often.

Where do I Buy Bitcoins?
The best resource for purchasing Bitcoin is the Buy Bitcoin World Wide website:
https://www.buybitcoinworldwide.com
Another website offering quick Bitcoin purchases is LocalBitcoins:
https://localbitcoins.com/buy_bitcoins
This is the official bitcoin website:
https://bitcoin.org

The makers of the Cradle cryptovirus demand that you pay a ransom sum of 0.25 Bitcoins, which is the equivalent of nearly 285 US dollars at the moment of writing this article. However, you should NOT meet their demands, nor contact these crooks under any circumstances. By proceeding with a payment you only will give money to the criminals, and nobody can guarantee that you will recover your data by doing so. To add to that, providing money to the cybercriminals is probably going to ignite their motivation to do more criminal acts, including the making of ransomware viruses.

Cradle Ransomware – Encryption Process

There is no official list with file extensions that the Cradle ransomware seeks to encrypt at this moment. However, this article will get duly updated if there anything new about this matter surfaces. All encrypted files will receive the .cradle extension, which will be appended to them.

→.7z, .bmp, .doc, .docm, .docx, .html, .jpeg, .jpg, .mp3, .mp4, .pdf, .php, .ppt, .pptx, .rar, .rtf, .sql, .tiff, .txt, .xls, .xlsx, .zip

The Cradle cryptovirus is quite possible to delete the Shadow Volume Copies from the Windows Operating System by using the following command:

→vssadmin.exe delete shadows /all /Quiet

If the command stated above is initiated, that will make the encryption process a bit more effective, as one of the ways for file recovery will get lost. Continue reading and find out what kinds of methods you can try out to potentially restore some of your data files.

Remove Cradle Ransomware and Restore .Cradle Files

If your computer got infected with the Cradle ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Manually delete Cradle from your computer

Note! Substantial notification about the Cradle threat: Manual removal of Cradle requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Cradle files and objects
2. Find malicious files created by Cradle on your PC

Automatically remove Cradle by downloading an advanced anti-malware program

1. Remove Cradle with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by Cradle
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.