.Jaff File Virus Removal (Restore Files)

.Jaff File Virus Removal (Restore Files)

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

The article will aid you to remove .Jaff File Virus effectively. Follow the .Jaff File Virus removal instructions at the end.

The .Jaff file virus is ransomware that encrypts data on your computer if it gets infected. Rumors about it being connected to the infamous Locky ransomware have dispersed after malware researchers have denied that being true. .Jaff will be the newly-appended extension to all files after they get encrypted. What is notable about the Jaff cryptovirus is that it copies some things from Locky like the payment page design, the way it spreads etc. Read on to see how you could try to potentially restore your files.

Threat Summary

Name.Jaff File Virus
TypeRansomware, Cryptovirus
Short Description.Jaff file virus mimics the distribution ways of the newest Locky ransomware variant making it successful in its infection.
SymptomsThe virus will encrypt your files and append the .Jaff extension on your files after it finishes the encryption process.
Distribution MethodSpam Emails with attachments, Macro commands hidden in fake documents
Detection Tool See If Your System Has Been Affected by .Jaff File Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .Jaff File Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.Jaff File Virus – Update

Update! A decryption tool is now available for the .Jaff File Virus! The tool is developed by Kaspersky and called RakhniDecryptor. It can be downloaded from the following link, wrapped inside a .zip archive: RakhniDecryptor.

.Jaff File Virus – Distribution Ways

Jaff ransomware not only utilizes the same distribution method used by the latest Locky virus, but it even surpasses it. That could be due to the probability of using another method for distribution alongside the ones it copies. Adding more to it, Jaff also copies the obfuscation (a tactic for malware to hide itself better) from the same source (Locky). Down here the distribution, extraction and infection ways of the .Jaff file virus will be explained.

Spam e-mail campaigns are in play, spreading millions of emails, which have PDF files attached to them.
Opening the PDF file will show the following:

Inside the PDF, you will see that there is an embedded .docm file, which you will be kindly asked to open up. This is how that document file looks from the inside if you open it up:

Once loaded, you will be asked to click on “Enable Editing” and right after that on “Enable Content”. From then on a macro script is loaded that will download the malicious executable for the .Jaff File Virus. The macro commands is detected to download the virus from one of the following URL locations:

  • http://takanashi[.]jp/f87346b
  • http://babil117[.]com/f87346b
  • http://easysupport[.]us/f87346b
  • http://julian-g[.]ro/f87346b
  • http://phinamco[.]com/f87346b
  • http://techno-kar[.]ru/f87346b
  • http://tiskr[.]com/f87346b
  • http://trans-atm[.]com/f87346b
  • http://trialinsider[.]com/f87346b
  • http://5hdnnd74fffrottd[.]com/af/f87346b
  • http://boaevents[.]com/f87346b
  • http://byydei74fg43ff4f[.]net/af/f87346b
  • http://edluke[.]com/f87346b
  • http://tending[.]info/f87346b
  • http://vscard[.]net/f87346b
  • http://wipersdirect[.]com/f87346b

Jaff ransomware could also be distributing its payload via social media networks and file-sharing sites. Refrain from opening files after downloaded them, especially if they come from places such as suspicious emails and links from an unknown source. Beforehand, you should scan the files with a security program, at the very least.

.Jaff File Virus – Technical Expertise

.Jaff file virus is ransomware, dubbed after the extension it places on files, after it encrypts them. Many have argued that it is a variant of the notorious Locky ransomware virus (.Loptr), due to the similarities between them. However, that has been proven otherwise by malware researchers who investigated the matter and concluded that their malicious code is different.

The .Jaff file virus copies Locky in more than one way, and uses that as a complementary scare tactic. Jaff is written on the “C” programming language, and its code is far less sophisticated than Locky. Still, that doesn’t exclude the possibility of the two ransomware viruses to share the same author. According to Proofpoint researchers, the malware spam campaigns for both viruses are currently spread via the Dridex Trojan, which itself is spread by the Necurs botnet. That’s some food for thought.

The .Jaff file virus makes entries in the Windows Registry to achieve a higher level of persistence, and even could launch and repress processes inside the Windows Operating System. Some of these entries are designed in a way that will start the virus automatically with every launch of Windows. A registry entry used by Jaff is:

→HKCU\Control Panel\Desktop\Wallpaper “C:\ProgramData\Rondo\WallpapeR.bmp”

The ransom note will be displayed after the encryption process finishes. The ransom note will be put inside three files, which are:

  • ReadMe.bmp
  • ReadMe.html
  • ReadMe.txt

All three files will have almost exactly the same contents.
Here is how the note looks like from the ReadMe.html message:

From the instructions given on that ransom note, you will be pointed out to the TOR payment page of the .Jaff file virus:

The Tor page will have the same design as the one of Locky, but with some minor difference.
The payment page states the following:

jaff decryptor system™

We present a special software – jaff decryptor™ – Recovery all files

How to buy jaff decryptor™?

You can make a payment with BitCoins, there are many methods to get them.

You should register BitCoin wallet:

Simplest online wallet or Some other methods of creating wallet

Purchasing Bitcoins, although it’s not yet easy to buy bitcoins, it’s getting simpler every day.

Here are our recommendations:

localbitcoins.com (WU) Buy Bitcoins with Western Union.
coincafe.com Recommended for fast, simple service.
Payment Methods: Western Union, Bank of America, Cash by FedEx, Moneygram, Money Order. In NYC: Bitcoin ATM, in person.
localbitcoins.com Service allows you to search for people in your community willing to sell bitcoins to you directly.
cex.io Buy Bitcoins with VISA/MASTERCARD or wire transfer.
btcdirect.eu The best for Europe.
bitquick.co Buy Bitcoins instantly for cash.
howtobuybitcoins.info An international directory of bitcoin exchanges.
cashintocoins.com Bitcoin for cash.
coinjar.com CoinJar allows direct bitcoin purchases on their site.

Send 1.82196031 BTC to Bitcoin address:

Note: Payment pending up to 30 mins or more for transaction confirmation, please be patient…

Date Amount BTC BTC address Confirmations
11.05.17, 09:20 1.82196031 15aCs4rGrfEs597hbo3PW93DVhTLTsxcii 0

Refresh the page and download jaff decryptor

When Bitcoin transactions will receive one confirmation, you will be redirected to the page for downloading the jaff decryptor

Apparently the .Jaff File Virus demands you to pay 1.82 Bitcoin, which equals to 3.382 US dollars at the moment of writing this article. Despite that, you should NOT under any circumstances pay the ransom of the cybercriminals. Nobody can guarantee that you will get your files restored from paying, nor that you won’t get your computer infected again in the future. Providing money to these criminals will motivate them further in the creation of more ransomware viruses.

.Jaff File Virus – Encryption Process

Jaff ransomware seeks to encrypt files that have the following 424 extensions:

→.xlsx, .acd, .pdf, .pfx, .crt, .der, .cad, .dwg, .MPEG, .rar, .veg, .zip, .txt, .jpg, .doc, .wbk, .mdb, .vcf, .docx, .ics, .vsc, .mdf, .dsr, .mdi, .msg, .xls, .ppt, .pps, .obd, .mpd, .dot, .xlt, .pot, .obt, .htm, .html, .mix, .pub, .vsd, .png, .ico, .rtf, .odt, .3dm, .3ds, .dxf, .max, .obj, .7z, .cbr, .deb, .gz, .rpm, .sitx, .tar, .tar, .gz, .zipx, .aif, .iff, .m3u, .m4a, .mid, .key, .vib, .stl, .psd, .ova, .xmod, .wda, .prn, .zpf, .swm, .xml, .xlsm, .par, .tib, .waw, .001, .002 003, ., .004, .005, .006, .007, .008, .009, .010, .contact, .dbx, .jnt, .mapimail, .oab, .ods, .ppsm, .pptm, .prf, .pst, .wab, .1cd, .3g2, .7ZIP, .accdb, .aoi, .asf, .asp, . aspx, .asx, .avi, .bak, .cer, .cfg, .class, .config, .css, .csv, .db, .dds, .fif, .flv, .idx, .js, .kwm, .laccdb, .idf, .lit, .mbx, .md, .mlb, .mov, .mp3, .mp4, .mpg, .pages, .php, .pwm, .rm, .safe, .sav, .save, .sql, .srt, .swf, .thm, .vob, .wav, .wma, .wmv, .xlsb, .aac, .ai, .arw, .c, .cdr, .cls, .cpi, .cpp, .cs, .db3, .docm, .dotm, .dotx, .drw, .dxb, .eps, .fla, .flac, .fxg, .java, .m, .m4v, .pcd, .pct, .pl, .potm, .potx, .ppam, .ppsx, .ps, .pspimage, .r3d, .rw2, .sldm, .sldx, .svg, .tga, .wps, .xla, .xlam, .xlm, .xltm, .xltx, .xlw, .act, .adp, .al, .bkp, .blend, .cdf, .cdx, .cgm, .cr2, .dac, .dbf, .dcr, .ddd, .design, .dtd, .fdb, .fff, .fpx, .h, .iif, .indd, .jpeg, .mos, .nd, .nsd, .nsf, .nsg, .nsh, .odc, .odp, .oil, .pas, .pat, .pef, .ptx, .qbb, .qbm, .sas7bdat, .say, .st4, .st6, .stc, .sxc, .sxw, .tlg, .wad, .xlk, .aiff, .bin, .bmp, .cmt, .dat, .dit, .edb, .flvv, .gif, .groups, .hdd, .hpp, .log, .m2ts, .m4p, .mkv, .ndf, .nvram, .ogg, .ost, .pab, .pdb, .pif, .qed, .qcow, .qcow2, .rvt, .st7, .stm, .vbox, .vdi, .vhd, .vhdx, .vmdk, .vmsd, .vmx, .vmxf, .3fr, .3pr, .ab4, .accde, .accdt, .ach, .acr, .adb, .srw, .st5, .st8, .std, .sti, .stw, .stx, .sxd, .sxg, .sxi, .sxm, .tex, .wallet, .wb2, .wpd, .x11, .x3f, .xis, .ycbcra, .qbw, .qbx, .qby, .raf, .rat, .raw, .rdb rwl, .rwz, .s3db, .sd0, .sda, .sdf, .sqlite, .sqlite3, .sqlitedb, .sr, .srf, .oth, .otp, .ots, .ott, .p12, .p7b, .p7c, .pdd, .pem, .plus_muhd, .plc, .pptx, .psafe3, .py, .qba, .qbr, .myd, .ndd, .nef, .nk, .nop, .nrw, .ns2, .ns3, .ns4, .nwb, .nx2, .nxl, .nyf, .odb, .odf, .odg, .odm, .ord, .otg, .ibz, .iiq, .incpas, .jpe, .kc2, .kdbx, .kdc, .kpdx, .lua, .mdc, .mef, .mfw, .mmw, .mny, .moneywell, .mrw, .des, .dgc, .djvu, .dng, .drf, .dxg, .eml, .erbsql, .erd, .exf, .ffd, .fh, .fhd, .gray, .grey, .gry, .hbk, .ibank, .ibd, .cdr4, .cdr5, .cdr6, .cdrw, .ce1, .ce2, .cib, .craw, .crw, .csh, .csl, .db_journal, .dc2, .dcs, .ddoc, .ddrw, .ads, .agdl, .ait, .apj, .asm, .awg, .back, .backup, .backupdb, .bank, .bay, .bdb, .bgt, .bik, .bpw, .cdr3, .as4

Each one of the files that gets encrypted will receive the same extension appended to them, and that is the .Jaff extension. The encryption algorithms which are utilized by the ransomware are believed to be AES and RSA.

The Jaff cryptovirus could be set to erase the Shadow Volume Copies from the Windows operating system by using the following command:

→vssadmin.exe delete shadows /all /Quiet

If the command above is executed, it will make decryption efforts harder, if you try to use a recovery method that involves the Shadow Volume Copies. Continue reading and see in what ways the potential restoration of your files could work.

Remove .Jaff File Virus and Restore Files

If your computer got infected with the Jaff ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share