This article aims to help you to remove the new version of MakTub Locker ransomware and help explain how to restore .encry encoded files.
A new version of the notorious MakTub ransomware, also known as Iron ransomware has been detected out in the wild. The virus aims to encrypt the files on your computer and then set the .encry file extension to the encrypted files. The malware then drops a ransom note type of file, whose primary purpose is to get you to pay a hefty ransom fee in order to get your encrypted files recovered back to a working state. If your computer has been infected by the .encry files virus, we advise you to remove this malware immediately from your computer and try to restore your files, preferably by using the information in this article.
|Name||.encry Files Virus|
|Short Description||Encrypts your files and holds them hostage until you pay a ransom to the criminals behind it to use the files again.|
|Symptoms||The .encry file extension is added to the encoded files. A ransom note, named !HELP_YOUR_FILES.html is also added.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by .encry Files Virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .encry Files Virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.encry Files Virus – Propagation
There is one main strategy which is used by the cyber-criminals to infect computers with Maktub Locker. This is to use an exploit kit which is often inserted as a result of a drive-by attack. These attacks can be spread when malicious objects, like URLs or files are introduced to victims. These may be spread in a couple of ways over the web, such as:
- Spam e-mail messages that may pretend to be original ones. Those usually pose as e-mails from big companies and pretend to be invoices or receipts.
- Posted URLs on social media chats or other e-mail spam messages that make them appear as if they were legitimate activation buttons that lead to the infection script.
The exploit kit is not only one object however. It is actually a set of obfuscated infection objects that check your system and antivirus before infection. Then, the kit runs the appropriate obfuscation in order to cause an unnoticed infection, leaving the victim no way of knowing that an infection is ongoing, until it’s too late and the files are already encrypted. One good method to stop such infection is to check your e-mails before opening them, using free services, such as ZipeZip (zipezip.com).
In addition to this, the malicious files, can also be spread in a more passive manner. You may encounter them to be uploaded online as game patches, software activators, cracks and other similar executables that pretend to be the ones you have downloaded online.
MakTub .encry Ransomware – More Information
Once the .encry files virus has infected your computer, the ransomware may immediately begin to download and execute various different types of files on the infected machine. These are often malicious files that may be of the following file types:
→ .exe, .tmp, .dll
The files may be dropped on the following Windows Locations:
After having dropped the files on the computer of the victim, the virus may modify the following Windows Registry sub-key by adding value entries that make it’s files run automatically on Windows boot:
The ransomware also drops a ransom note file, named !HELP_YOUR_FILES.html. It has the following appearance:
The ransom note leads victims to a TOR-based web page, whose primary purpose is to provide more information about the payment process, as seen below:
.encry Files Virus – Encryption Process
The .encry files virus is the type of virus whose primary purpose is to encrypt the files that you often use. To do this the malware scans for the following file types:
→ .001, .1cd, .3fr, .8ba, .8bc, .8be, .8bf, .8bi8, .8bl, .8bs, .8bx, .8by, .8li, .DayZProfile, .abk, .ade, .adpb, .adr, .aip, .amxx, .ape, .api, .apk, .arch00, .aro, .arw, .asa, .ascx, .ashx, .asmx, .asp, .asr, .asset, .bar, .bay, .bc6, .bc7, .bi8, .bic, .big, .bin, .bkf, .bkp, .blob, .blp, .bml, .bp2, .bp3, .bpl, .bsa, .bsp, .cab, .cap, .cas, .ccd, .cch, .cer, .cfg, .cfr, .cgf, .chk, .class, .clr, .cms, .cod, .col, .con, .cpp, .cr2, .crt, .crw, .csi, .cso, .css, .csv, .ctt, .cty, .cwf, .d3dbsp, .dal, .dap, .das, .db0, .dbb, .dbf, .dbx, .dcp, .dcr, .dcu, .ddc, .ddcx, .dem, .der, .desc, .dev, .dex, .dic, .dif, .dii, .disk, .dmg, .dmp, .dob, .dox, .dpk, .dpl, .dpr, .dsk, .dsp, .dvd, .dxg, .elf, .epk, .eql, .erf, .esm, .f90, .fcd, .fla, .flp, .for, .forge, .fos, .fpk, .fpp, .fsh, .gam, .gdb, .gho, .grf, .h3m, .h4r, .hkdb, .hkx, .hplg, .htm, .html, .hvpl, .ibank, .icxs, .img, .indd, .ipa, .iso, .isu, .isz, .itdb, .itl, .itm, .iwd, .iwi, .jar, .jav, .java, .jpe, .kdc, .kmz, .layout, .lbf, .lbi, .lcd, .lcf, .ldb, .ldf, .lgp, .litemod, .lng, .lrf, .ltm, .ltx, .lvl, .m3u, .m4a, .map, .mbx, .mcd, .mcgame, .mcmeta, .md0, .md1, .md2, .md3, .mdb, .mdbackup, .mddata, .mdf, .mdl, .mdn, .mds, .mef, .menu, .mm6, .mm7, .mm8, .moz, .mpq, .mpqge, .mrwref, .mxp, .ncf, .nds, .nrg, .nri, .nrw, .ntl, .odb, .odf, .odp, .ods, .odt, .orf, .owl, .oxt, .p12, .p7b, .p7c, .pab, .pbp, .pef, .pem, .pfx, .pkb, .pkh, .pkpass, .plc, .pli, .pot, .potm, .potx, .ppf, .ppsm, .pptm, .prc, .prt, .psa, .pst, .ptx, .pwf, .pxp, .qbb, .qdf, .qel, .qic, .qpx, .qtr, .r3d, .raf, .re4, .res, .rgn, .rgss3a, .rim, .rofl, .rrt, .rsrc, .rsw, .rte, .rw2, .rwl, .sad, .sav, .sc2save, .scm, .scx, .sdb, .sdc, .sds, .sdt, .shw, .sid, .sidd, .sidn, .sie, .sis, .slm, .slt, .snp, .snx, .spr, .sql, .sr2, .srf, .srw, .std, .stt, .sud, .sum, .svg, .svr, .swd, .syncdb, .t01, .t03, .t05, .t12, .t13, .tar.gz, .tax, .tcx, .thmx, .tlz, .tor, .torrent, .tpu, .tpx, .ttarch2, .tur, .txd, .txf, .uax, .udf, .umx, .unity3d, .unr, .uop, .upk, .upoi, .url, .usa, .usx, .ut2, .ut3, .utc, .utx, .uvx, .uxx, .vcd, .vdf, .ver, .vfs0, .vhd, .vmf, .vmt, .vpk, .vpp_pc, .vsi, .vtf, .w3g, .w3x, .wad, .war, .wb2, .wdgt, .wks, .wmdb, .wmo, .wotreplay, .wpd, .wpl, .wps, .wtd, .wtf, .x3f, .xla, .xlam, .xlc, .xlk, .xll, .xlm, .xlr, .xlsb, .xltx, .xlv, .xlwx, .xpi, .xpt, .yab, .yps, .z02, .z04, .zap, .zipx, .zoo, .ztmp
In addition to this, the ransomware may also encrypt files that are saves of various often played games on Steam, like DayZ, World of Tanks and others of similar types. The MakTub virus is very clever to skit encrypting files of the following file types, to ensure that Windows functions properly:
→ Windows, windows, Microsoft, Mozilla Firefox, Opera, Internet Explorer, Temp, Local, LocalLow, $Recycle.bin, boot, i386, st_v2, intel, recycle, 360rec, 360sec, 360sand, internet explorer, msbuild
TO encrypt the files, the malware may use the AES encryption algorithm and after it encodes the files, the virus generates a unique decryption key. The decryption for this key is only available for the cyber-criminals as it is RSA encrypted on the victim’s computer and cannot be accessed to be used to decode the files. The files, encrypted by the .ency files virus look like the following after encryption has completed:
Remove .encry Files Virus and Restore Encrypted Data
In order to make sure that this ransomware virus is gone from your computer, reccomendations are to follow the removal instructions underneath this article. If manual removal Is not something that you feel confident in doing, be advised that security researchers often recommend to use and advanced anti-malware software to perform automatic removal as it is the most effective method. It will not only ensure complete security of your computer, but will also guarantee that your system remains protected against future threats.
In addition to removing this virus, if you want to try and restore as many .encry files as possible, reccomendations are to try the alternative methods for file recovery underneath in step “2. Restore files encrypted by .encry Files Virus”. They may not be 100% effective, but may help you to restore at least some of your encrypted files.