.killedXXX File Virus (Restore RIJNDAEL Files) - How to, Technology and PC Security Forum | SensorsTechForum.com

.killedXXX File Virus (Restore RIJNDAEL Files)

Article made to help remove DNRansomware and restore .killedXXX encrypted files witg the AES(RIJNDAEL) encryption algorithm.

A new ransomware virus, called DNRansomware also referred to as DoNotOpen ransomware by malware researchers has been reported to cause issues to systems. The virus locks the files on the compromised computers, appending the .killedXXX file extension to them and asking the victims to pay a hefty ransom fee of around 0.5 BTC in order to get the files back. Anyone who has become a victim of this virus is advised not to pay a dime and read the following material. It will help you learn more about DNRansomware and how to remove it and try restoring files back to their working state.

Update! There is now a decryptor tool for this ransomware! The tool was created by the malware researcher Michael Gillespie and can be downloaded from the following link, wrapped inside a .zip archive: StupidDecrypter.

Threat Summary

Name

DNRansomware

TypeRansomware
Short DescriptionA ransomware type of virus that not only locks the screen of the infected computers, but also encrypts the files with a broken AES cipher that is reported to be undecryptable.
SymptomsThe .killedXXX file extension is added to every encrypted file and the sum of 0.5 BTC is demanded from the victims after an infection by this ransomware virus. Also, a lock-screen that is unlock-able is present.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by DNRansomware

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss DNRansomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

DNRansomware Virus – Spread

To be widespread, similar to Sage 2.0 Ransomware and cause a successful infection on targeted computers, the creators of DNRansomware may undertake multiple different steps towards spreading this virus. One of those is surely the usage of fake Google Chrome update file which actually masks the malicious DNRansomware’s payload carrying file. The ransomware has been reported to possibly be spread via e-mail spam messages and malicious applications, pretending to be legitimate programs. Other instances of it may be detected when you see a fake Adobe Flash Player updates on your computer. Even though it is not confirmed, researchers feel convinced that installers of legitimate programs may also be infected with the DNRansomware virus.

DNRansomware – More Information

Once the user is infected, one way or the other, the virus immediately commences a lock-screen on his computer. This type of lock-screen attack has one purpose only and it is to scare the user off to pay a hefty ransom fee to get the files back:

Source:id-ransomware.blogspot.bg

After the lock-screen by DNRansowmare is displayed, users are advised not t pay any type of ransom to unlock their computer, because the password to unlock this lock screen is:

→ M3VZ>5BwGGVH

But, if you unlock your screen, you may still find the ransom note of the DNRansomware virus:

Source:id-ransomware.blogspot.bg

This ransom note aims to explain the whole situation for the user and even provide detail instructions on how to pay the hefty ransom fee and hopefully try to get the encrypted files restored back to their initial state.

Howver, malware researchers have detected that this is impossible, even if the victim pays, because the decrypter of the ransomware may appear to be broken. One more reason why paying is highly not recommended.

To encrypt the files, the virus says it uses RIJNDAEL algorithm, which is correct. Researchers have reported it to use the AES cipher to replace bits of the files it encrypts and make them unable to be opened. AES is another name for Rijndael which is a cipher used by the government for confidential files.

To encrypt files, DNRansomware may look for different types of often used data, for example:

→ “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”Source:fileinfo.com

The encrypted files may have the .killedXXX file extension appended to them and may look like the following:

Remove DNRansomware and Restore .killedXXX Encrypted Files

Since you do not have another option, we advise you to follow the following steps:

Step 1: Secure the encrypted files. Back them up on a thumb drive, in the cloud or anywhere where you may find useful.

Step 2: Remove DNRasnomware. One way to do it is by following the removal instructions below. These instructions will help you remove the virus. If you lack the experience in manual removal or want to be sure the virus is eliminated, experts recommend using a particular anti-malware tool that will detect all files and other objects associated with DNRansomware and get rid of them.

Step 3: Try to restore your files using other methods while hopefully a free decryptor is released. We have suggested several alternative tools in step “2. Restore files encrypted by DNRansomware” below to help recover your information and some of those might be of use to you. Remember to use them after you have backed up the encrypted files.

Manually delete DNRansomware from your computer

Note! Substantial notification about the DNRansomware threat: Manual removal of DNRansomware requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove DNRansomware files and objects
2.Find malicious files created by DNRansomware on your PC

Automatically remove DNRansomware by downloading an advanced anti-malware program

1. Remove DNRansomware with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by DNRansomware
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...