How to Remove LooCipher Ransomware

How to Remove LooCipher Ransomware

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

What is LooCipher ransomware? Can .lcphr files be recovered? How to remove LooCipher ransomware?

LooCipher ransomware is a nasty infection that prevents you from accessing personal files and forces you to pay a ransom for decryption software. According to the ransom message LooCipher leaves (@Please_Read_Me.txt) the payment should be made in Bitcoin cryptocurrency. Sure sign of infection with this ransomware is the extension .lcphr that locks corrupted files.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer system and demands a ransom to be paid to allegedly recover them.
SymptomsThe LooCipher ransomware will encrypt your files by appending the .lcphr extension to them, along with a unique identification number placing the new .lcphr extension as a secondary.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by LooCipher


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss LooCipher.
Data Recovery ToolWindows Data Recovery by Stellar Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

LooCipher Ransomware – Spread Mechanisms and Impact

LooCipher is a data locker ransomware that has been discovered a few days ago. Currently, it is actively being used in attack campaigns against online users worldwide. In the event that you are a victim of LooCipher we recommend you to keep up with our ransomware removal guide and clean your infected PC.

As reported by security researchers, the attack campaigns that are spreading LooCipher’s infection files are mainly realized with the help of spam email messages. These spam emails were detected to present the document Info_BSV_2019.docm as an attachment. Since hackers may configure the emails to pose as sent by well-known companies, websites and institutions it may quite tricky to recognize that they attempt to deliver malicious code on your device. One way to avoid running malicious files on your device is to upload them on VirusTotal where they will be scanned for present malicious code. Along with spam emails fake software updates, corrupted web pages, and potentially unwanted programs may also be utilized for the spread of LooCipher ransomware.

The moment LooCipher ransomware is loaded on the system, it becomes able to perform a long sequence of malicious activities that affect essential system components. The main purpose of this threat is to become able to reach valuable personal files and then encrypt them with the help of a strong cipher algorithm. For the purpose it activates a built-in cipher module that scans system drives for all of the following types of files:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

Since the code of these files is transformed by LooCihper ransomware, they remain inaccessible. As a typical cryptovirus, LooCipher renames all files it corrupts by appending the extension .lcphr to their names.

Finally, the threat drops a ransom message file named @Please_Read_Me.txt to extort payment from its victims. Soon after it establishes the file on the system, LooCipher ransomware generates it automatically on the screen. You can see the instructions below:

Q: What happened to my files?
A: All your important files (including those on the network disks, USBs, etc.) have been encrypted using a strong algorithm with a private and unique key generated for you.
Q: Where is my key?
A: Your key is stored in our tor servers in order to preserve the anonymity.
Q: What do I do?
A: You need to make a Bitcoin payment for the decryption.
Please send €300 (~$330) worth of Bitcoin to this address: 1Ps5Vd9dKWuy9FuMDkec9qquCyTLjc2Bxe
Q: Can I recover my files by other means?
A: No. There is not such a computing power nowadays to find this key within the time of a human could live. Even if you use Tianhe-2
(Milkyway-2), currently the fastest supercomputer in the world, it will take millions of years. Neither NO ONE ANTIVIRUS CAN BRING YOUR FILES BACK, the only thing they could do is delete the decryptor software, but it’s impossible they can recover your files, and if some of them is trying to sell you that, we invite you to purchase it and try.
Q: How much time do I have?
A: You have 5 days since your files were encrypted. Specifically until 2019/06/24 14:28. After this period your key will be automatically
destroyed (except for the case of having made the transaction within the period but because of the transaction remains pending of being
confirmed by the blockchain this time period is excedeed. In this case the key will remain safe throughout all this “pending of being confirmed” status of your transaction and additionally it will remain 7 days more after your transaction is confirmed in order that you have enough time to recover your files)
Q: How can I trust?
A: We strongly guarantee you can recover your files. Besides, if we didn’t do it nobody trust us and we wouldn’t get any payment. In fact, we built the decryptor in the own encryptor software as well in order to make the decryption process as simple as possible for you, thus avoiding having to download an external decryptor. Just make the payment, click and if your payment is approved the button will become enable to click.
If somehow you closed the decryptor window and you can’t run the decryptor software you can download a copy of the decryptor through this link:!KclRVIRY!YrUgGjvldsoTuNZbCOjebAz5La7hbB41nJHklmlgqZo
(Don’t worry, your files won’t be re-encrypted if they already are).


Beside the instructions you can see in the above image, there is a note that states the following:

All your important files are encrypted!
All your important files (photos, documents, databases, etc.), including those on the network disks, USB, etc. were encrypted using a strong algorithm with a private and unique key generated for this computer. This key is stored in our TOR server and the only way to receive your key and decrypt your files is making a Bitcoin payment.

We strongly guarantee that you can recover all your files safely and easily.

But you need to make the payment before 5 days after your files were encrypted, since the server will automatically destroy your key after that period and then nobody will ever be able to restore your files.
Don’t spend your time searching alternative solutions to recover your files because there is no other solution. If you don’t know how to buy Bitcoins click How to buy Bitcoin? TO RECOVER YOUR FILES FOLLOW THESE 3 STEPS:

1. Send at least €300 worth of Bitcoin to this Bitcoin address generated for you:
[redacted] 2. Once you have made the payment click Check Payment
* your transaction may take some hours to be confirmed by the Blockchain system, so if you Check Payment and it fails wait some hours and try again. Don’t worry, we will not delete your key while your transaction is done but pending of being confirmed.

3. If your payment was approved, this button will get automatically enabled.
Then, just click it to decrypt all your files:

The extortionists want you to pay a ransom for the alleged restoration of your files, same as with a lot of ransomware viruses. You should NOT under any circumstances pay any ransom sum.

Remove LooCipher Ransomware from Your Computer

The so-called LooCipher Ransomware is a threat with highly complex code that corrupts both system settings and valuable data. So an infected system could be used in a secure manner again only after all malicious files and objects are removed. For the purpose, we recommend the help of our guide that reveals how to remove LooCipher virus from the computer. In addition, the guide presents several alternative data recovery approaches that may be helpful for the restoration of .lcphr files. We remind you to back up all encrypted files to an external drive before the recovery process.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share