Hell Radiation Ransomware Removal – Restore Files
THREAT REMOVAL

Hell Radiation Ransomware Removal – Restore Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Hell Radiation and other threats.
Threats such as Hell Radiation may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article will aid you in removing the Hell Radiation ransomware effectively. Follow the virus removal instructions given at the end.

Hell Radiation ransomware is the name of a cryptovirus that has been found recently. After encryption, your Desktop background will change with instructions leading you to the ransom note. In the note it is demanded that you pay around 300 US dollars to a specific Bitcoin address, to allegedly return your files. No new extension is appended to the encrypted files, but they are encrypted and unopenable. Read on and find out what ways you could try to potentially recover some of your files.

Threat Summary

NameHell Radiation
TypeRansomware
Short DescriptionThe ransomware encrypts files on your computer system and it places a ransom note with payment instructions.
SymptomsThis ransomware virus will encrypt your files without putting a new extension to them, still deeming them unable to be opened. Then it demands that you pay a ransom of around 300 US dollars to a Bitcoin address.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Hell Radiation

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Hell Radiation.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Hell Radiation Ransomware – Distribution

Hell Radiation ransomware could be distributed in more than one way. However, the way that is the most widespread is via a payload dropper file which initiates the malicious script for the ransomware. Samples have been spotted by malware researchers and you can preview one of them sent for analysis on the VirusTotal service right here:

The Hell Radiation ransomware might be using other ways to distribute the payload file, such as social media and file-sharing sites. Freeware applications found on the Internet could be promoted as helpful but also could hide the malicious script for this virus. Before opening any files after you have downloaded them, you should instead scan them with a security program. Especially if they come from suspicious places, such as emails or links. Also, don’t forget to check the size and signatures of such files for anything that seems out of place. You should read the ransomware prevention tips given in the forum section.

Hell Radiation Ransomware – Description

The Hell Radiation ransomware is a cryptovirus, which has been recently discovered by malware researchers. Interestingly enough, the ransomware actually has two names – Hell and Radiation. Ambiguous, but both names are used – one on the wallpaper and the other on the ransom message screen.

After the Hell Radiation ransomware encrypts your files, it will not append any new extension to the encrypted files but still make the unable to be opened. It then changes your Desktop background and places a ransom note with instructions inside your computer system.

Hell Radiation ransomware could be set to make new registry entries in the Windows Registry to achieve a higher level of persistence. Those entries are usually designed in a way that will start the virus automatically with every launch of the Windows Operating System, like in the example given below:

→“HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run”

Files that are associated with the ransomware, some of which it creates after encryption are these:

  • ChaseBot.exe
  • RADIATION.bin
  • RADIATION.txt
  • memes.jpg
  • decrypt.exe
  • decrypt.txt
  • decrypter.exe
  • public.me
  • private.me

Your Desktop Background will be changed to the following one:

The background states the following:

Ugh.. oh! Your Files Are Encrypted!
To retrieve your files
Please Refer to decrypt.exe and decrypt.txt
These files can be found on your desktop
#Hell Ransomware Made by KingCobra

The ransom note will be placed inside a file called decrypt.txt. The message from that note is revealed in the below screenshot:

The message states the following:

Q: What’s wrong with my files?
A: Ooops, your important files are encrypted.
It means you will not be able to access them anymore until they are decrypted.
If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely!
Let’s start decrypting!
Q: What do I do?
A: First, you need to pay service fees for the decryption.Please send $300 worth of bitcoin to this bitcoin address BTC 1CryptcfFKJJES1Gh5zAoFtmnPYLCRcMmY
Next, please find an application file named Decrypter. It is the decrypt software.0k follow how to pay the instruction!
(You man need to disable your antivirus for a while.)
Q; How can I trust?
A: Don’t worry about decryption if you make transaction via bitcoin to specific server our give you how pay instruction to bitcoin Address BTC 1CryptcfFKJJES1Gh5zAoFtmnPYLCRcMmY

The above message has another variant with a window interface as seen below:

That message is the following:

Note your files are encrypted with AES + RSA encryption. This is not normal. In order to get your files back send 310$ to the bitcoin address below. There is no other way to decrypt your files. Any attempt to remove the ransomware may result in deletion of files and loss of data! Only Bitcoin is accepted. For more info on how to buy bitcoin click the button below.
Bitcoin Address: 1C6pQvfm4SfLuLZzLZsJUSKsxtSRCR23nR
How to Buy Brtcoin

Check Payment
Decrypt

It also has instructions on how to obtain Bitcoins:

And you can see these instructions in text down below:

How to buy bitcoin
First Step: Get A Wallet
First you’ll need a bitcoin wallet – an app that lets you receive, hold, and spend bitcoin.
Any one can work like http://coinbase.com
IF you want to keep this simple skip to the next step
Second Step: Buy some bitcoin
Once you’ve set up your wallet app, you’ll need to buy some bitcoin.
Bitcoin exchanges are available all over the world allowing users to convert any currency into and out of bitcoin. Every country and
region is different, so you’ll want to do some research before choosing an exchange.
Some exchanges that does most times not require an ID for verification are paxful which can be found at http http://www.paxful.com another
is https://localbitcoins.com.
Many other places also sell bitcoin.
Third Step: Make the Payment
Making a bitcoin payment is fast, convenient, and extremely secure.
To make a payment, you won’t need to enter any sensitive card information.
Instead, you’ll simply send the payment from your bitcoin wallet.
So put in our address and send the bitcoin. We are legit and can be trusted. This is not a typical ransomware through which you do not
get your files back.
We would also like to remind you that, there is no other way to retrieve your files! Any “decrypter” or “antivirus” product simply is a scam
and does not and will not work. It is really hard to crack a strong cipher bke RSA + AES.

So, you are demanded to pay around 300 US dollars to 1 of 2 Bitcoin addresses. Not only is that confusing, but also, you might get unlucky and send to an older one and the ransomware creators ask you to pay to the other address as well. Do NOT contact, nor pay these cybercriminals and you should not even think of doing that under any circumstances. By paying, you can only motivate them to indulge in similar criminal acts in the future, and is strongly advised against. Besides, it is not guaranteed you will receive your files back.

Hell Radiation Ransomware – Encryption

There is no official list with file extensions that the Hell Radiation ransomware seeks to encrypt and the article will be duly updated if that changes. The encryption is believed to be a mixture of RSA and AES.

The Hell Radiation cryptovirus is more than likely to erase the Shadow Volume Copies from the Windows Operating System by executing the following command:

→vssadmin.exe delete shadows /all /Quiet

If the above-stated command is inputted into the command prompt of the Windows operating system, that will make the encryption process more effective, as one of the main ways for file recovery will be gone. Keep reading to find out what methods you can try out to potentially restore some of your data.

Remove Hell Radiation Ransomware and Restore Files

If your computer got infected with the Hell Radiation ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by Hell Radiation and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Hell Radiation.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Hell Radiation follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Hell Radiation files and objects
2. Find files created by Hell Radiation on your PC

IMPORTANT!
Before starting the Automatic Removal below, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by Hell Radiation

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...