A ransomware virus, very similar to JigSaw ransomware has been discovered by malware researchers. The virus is believed to be created by someone calling himself “carlv”. The ransomware aims to encrypt the files on the PC’s which it has previously infected and demand a ransom payoff of 350 USD from the victims to pay in order to get their files back. If you are one of the victims of this virus, we strongly suggest you to read the following material.
|Name||The Dark Encryptor|
|Short Description||Resembles JigSaw ransomware. Encrypts the files and then adds a wallpaper with the ransom note, demanding 350 dollars to be paid to get the files back.|
|Symptoms||Files are encrypted to the point that they cannot be decrypted unless you have the private key. To them, the extension .tdelf is added.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by The Dark Encryptor |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss The Dark Encryptor.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
The Dark Encryptor Virus – Spread
For this virus to cause a successful infection, the ones behind it may use a combination of different malicious tools:
- Malware obfuscators to conceal the loader or the infection objects from antivirus software.
- Exploit kits to exploit non-updated Windows operating systems.
- Spam software or spamming services to spread the infection file.
- A set of hosts to which the infection file connects and downloads the payload from.
In addition to those tools, the crooks may also have a pre-created list of e-mail addresses from which they may send out spam messages that may either contain malicious web links or malicious e-mail attachments. The e-mails have convincing messages within them, that get the victim to click on an attachment or a web link, similar to the example below:
The Dark Encryptor – More Information
After the user opens the malicious file of the virus, the executable of The Dark Encryptor is dropped on the compromised computer while remaining undetected. It has been reported by researchers and uploaded on VirusTotal.com as RansomWare.exe:
Besides this malicious files, The Dark Encryptor ransomware may also situate other support modules that may result in various activities on the compromised computer:
- The virus may gain administrative access to your PC.
- It may add value strings in the Run and RunOnce Windows registry keys in order to run automatically on Windows start.
- It may delete the shadow volume copies on the infected computer by using the vssadmin and bcedit commands.
In addition to those activities, The Dark Encryptor also adds it’s ransom note to be automatically opened on the desktop of the victim. It has the following ransom demands:
“THE DARK ENCRYPTOR
All your files have been encrypted by THE DARK ENCRYPTOR using a military grade encryption algorithm.
But dont worry ! You can get them backn you just need to pay 100 USD in bitcoin. For more informationst please read the text document placed on your Desktop.
Have a nice day !
WARNING: The price will rise to 350 USD if you don’t pay in the next 5 days.”
The Dark Encryptor – Encryption Process
It is widely believed that The Dark Encryptor may use a strong encryption algorithm to render the files on the computers it infects no longer able to be opened. However, there is also the possibility that there is a mistake in the encryption mode and the virus later may be decrypted.
For the encryption process, The Dark Encryptor uses the .tdelf file extension to identify itself. It is added as a suffix to the files encrypted by this virus.
After this has completed, The Dark Encryptor may self-delete or remain active on the victim’s computer. It is interesting that the virus may target only specific file types, like:
- Microsoft Office documents.
- Documents related to Adobe software.
- Other important files.
Remove The Dark Encryptor Ransomware and Restore Your Files
Before doing any removal actions, we recommend you to backup your files even if they are encrypted.
Then you can proceed with the removal process, preferably by following the removal instructions underneath. They are specifically designed to help you remove The Dark Encryptor either manually or automatically. In case you lack the experience in manual removal, cybersec experts recommend using an anti-malware scanner to eliminate The Dark Encryptor ransomware virus automatically.
At this current point, there is no official decryptor for The Dark Encryptor ransomware threat. However, it may as well come out soon. We are monitoring the situation and will update this blog post as soon as a free decryptor is released. In the meantime, you are advised to try alternative file recovery methods, like the ones in step “2. Restore files encrypted by The Dark Encryptor” below. They may not be 100% effective, especially if you have reinstalled Windows, but may help recover a big portion of your encrypted files.