.Fuck_You File Virus – Remove and Restore Your Files

.Fuck_You File Virus – Remove and Restore Your Files

The article will aid you to remove .Fuck_You file virus in full. Follow the ransomware removal instructions at the end of this article.

.Fuck_You is the extension that is used by a ransomware cryptovirus that is named GC47 by its creator. The extension .Fuck_You will be appended to every encrypted file. The encryption algorithm that is believed to be used is AES as the ransomware is suggested to stem from the HiddenTear/EDA2 project. The .Fuck_You cryptovirus will create a concise ransom note held within a text file. Keep reading and see how you could try to potentially recover some of your data.

Threat Summary

Name.Fuck_You File Virus (GC47)
Short DescriptionThe ransomware encrypts files on your computer and leaves a ransom message afterward.
SymptomsThe ransomware will encrypt your files and put the extension .Fuck_You on your files after it finishes its encryption process.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .Fuck_You File Virus (GC47)


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .Fuck_You File Virus (GC47).
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.Fuck_You File Virus – Infection

.Fuck_You ransomware could spread its infection in multiple ways. A payload file which initiates the malicious script for the ransomware in question is seen on the Internet. Your computer system will get encrypted by the cryptovirus if its malicious script gets executed. You can view one such payload dropper, which is uploaded to the VirusTotal service by malware researchers, right here:

.Fuck_You ransomware might also be spreading its payload file on social media sites and file-sharing networks. Freeware that is spread on the Internet can be presented as helpful but could also hide the malicious script for this cryptovirus. Refrain from opening files after you have downloaded them, especially if they are coming from suspicious places like emails or links of unknown origin. Instead, you should scan the files with a security tool and check their size and signatures for anything that seems out of place. Read the ransomware prevention tips from the forum section to see how to avoid infection.

.Fuck_You File Virus – In Detail

.Fuck_You file virus is of the ransomware type variety. According to the analysis of the malware researcher Karsten Hahn, the virus has been given the name GC47 by its creator. The extension .Fuck_You will get appended to all files that become locked after the encryption process finishes.

.Fuck_You ransomware could make entries in the Windows Registry to achieve some form of persistence, and even launch and repress processes inside the Windows Operating System. Some of these entries are designed in a way that will start the virus automatically with every launch of Windows.

The ransom note will be placed inside a .txt file after the encryption process is complete. The file with the ransom note is called READ_IT.txt. It contains very concise instructions about recovering your files.

The ransom note looks like this:

The note reads the following:

Fuck_You was Encrypt your File
Send 50 USD BTC Address 14vY5z8fWzCj93YTwbGiLd6ansZNMJ2kC3
Then meet me
my email [email protected]

The ransomware is reported to be a HiddenTear/EDA2 variant by the malware researcher Karsten Hahn. You can read more about the HiddenTear/EDA2 open-source project from the corresponding article in the blog.

Inside the note of .Fuck_You ransomware the cybercriminal behind the virus demands 50 US dollars to be paid out as ransom in the form of BitCoins. A Bitcoin address is provided and an e-mail address is given as a contact. However, you should NOT under any circumstances pay the crook behind this virus, neither should you use the provided e-mail for contact. Your files may not get restored, and nobody could guarantee it. Furthermore, giving money to the criminal will likely just be the motivation needed for distributing more ransomware viruses or doing other criminal activities.

As it is a HiddenTear variant the .Fuck_You ransomware probably seeks to encrypt files with the following extensions:

→.txt, .doc, .docx, .xls, .xlsx, .pdf, .pps, .ppt, .pptx, .odt, .gif, .jpg, .png, .db, .csv, .sql, .mdb.sln.php, .asp, .aspx, .html, .xml, .psd, .frm, .myd, .myi, .dbf, .mp3, .mp4, .avi, .mov, .mpg, .rm, .wmv, .m4a, .mpa, .wav, .sav, .gam, .log, .ged, .msg, .myo, .tax, .ynab, .ifx, .ofx, .qfx, .qif, .qdf, .tax2013, .tax2014, .tax2015, .box, .ncf, .nsf, .ntf, .lwp

Each of the files that gets encrypted will receive the same extension appended to the end of their names, and that is precisely the .Fuck_You extension. The encryption which is utilized by the ransomware is believed to be AES as that is the encryption algorithm used by HiddenTear variants.

The .Fuck_You cryptovirus is highly likely to delete the Shadow Copies from the Windows operating system by utilizing the following command:

→vssadmin.exe delete shadows /all /Quiet

Keep on reading and check out what type of ways you can try to potentially restore some of your files.

Remove .Fuck_You File Virus and Restore Your Data

If your computer got infected with the .Fuck_You ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share