A new ransomware virus, called DNRansomware also referred to as DoNotOpen ransomware by malware researchers has been reported to cause issues to systems. The virus locks the files on the compromised computers, appending the .killedXXX file extension to them and asking the victims to pay a hefty ransom fee of around 0.5 BTC in order to get the files back. Anyone who has become a victim of this virus is advised not to pay a dime and read the following material. It will help you learn more about DNRansomware and how to remove it and try restoring files back to their working state.
|Short Description||A ransomware type of virus that not only locks the screen of the infected computers, but also encrypts the files with a broken AES cipher that is reported to be undecryptable.|
|Symptoms||The .killedXXX file extension is added to every encrypted file and the sum of 0.5 BTC is demanded from the victims after an infection by this ransomware virus. Also, a lock-screen that is unlock-able is present.|
|Detection Tool|| See If Your System Has Been Affected by DNRansomware |
Malware Removal Tool
|User Experience||Join our forum to Discuss DNRansomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
DNRansomware Virus – Spread
To be widespread, similar to Sage 2.0 Ransomware and cause a successful infection on targeted computers, the creators of DNRansomware may undertake multiple different steps towards spreading this virus. One of those is surely the usage of fake Google Chrome update file which actually masks the malicious DNRansomware’s payload carrying file. The ransomware has been reported to possibly be spread via e-mail spam messages and malicious applications, pretending to be legitimate programs. Other instances of it may be detected when you see a fake Adobe Flash Player updates on your computer. Even though it is not confirmed, researchers feel convinced that installers of legitimate programs may also be infected with the DNRansomware virus.
DNRansomware – More Information
Once the user is infected, one way or the other, the virus immediately commences a lock-screen on his computer. This type of lock-screen attack has one purpose only and it is to scare the user off to pay a hefty ransom fee to get the files back:
After the lock-screen by DNRansowmare is displayed, users are advised not t pay any type of ransom to unlock their computer, because the password to unlock this lock screen is:
But, if you unlock your screen, you may still find the ransom note of the DNRansomware virus:
This ransom note aims to explain the whole situation for the user and even provide detail instructions on how to pay the hefty ransom fee and hopefully try to get the encrypted files restored back to their initial state.
Howver, malware researchers have detected that this is impossible, even if the victim pays, because the decrypter of the ransomware may appear to be broken. One more reason why paying is highly not recommended.
To encrypt the files, the virus says it uses RIJNDAEL algorithm, which is correct. Researchers have reported it to use the AES cipher to replace bits of the files it encrypts and make them unable to be opened. AES is another name for Rijndael which is a cipher used by the government for confidential files.
To encrypt files, DNRansomware may look for different types of often used data, for example:
→ “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”Source:fileinfo.com
The encrypted files may have the .killedXXX file extension appended to them and may look like the following:
Remove DNRansomware and Restore .killedXXX Encrypted Files
Since you do not have another option, we advise you to follow the following steps:
Step 1: Secure the encrypted files. Back them up on a thumb drive, in the cloud or anywhere where you may find useful.
Step 2: Remove DNRasnomware. One way to do it is by following the removal instructions below. These instructions will help you remove the virus. If you lack the experience in manual removal or want to be sure the virus is eliminated, experts recommend using a particular anti-malware tool that will detect all files and other objects associated with DNRansomware and get rid of them.
Step 3: Try to restore your files using other methods while hopefully a free decryptor is released. We have suggested several alternative tools in step “2. Restore files encrypted by DNRansomware” below to help recover your information and some of those might be of use to you. Remember to use them after you have backed up the encrypted files.