Masterlock@india.com Virus Remove and Restore .crypt Files - How to, Technology and PC Security Forum | SensorsTechForum.com

[email protected] Virus Remove and Restore .crypt Files

ransomware-on-focus-sensorstechforumA ransomware virus belonging to the @india.com ransomware variants has been reported to encrypt user files using a strong encryption algorithm. After encryption, the Masterlock virus leaves a .crypt file extension along with a unique identification number. All users infected by this ransomware should not pay the 3 BTC ransom price asked by the cyber criminals and read this article to learn how to remove the Masterlock virus and restore your encrypted files.

Threat Summary

Name[email protected]
TypeRansomware
Short DescriptionThe ransomware encrypts files with the AES algorithm and asks a ransom of 3 BTC for decryption.
SymptomsFiles are encrypted with a .crypt file extension added to them and become inaccessible. A ransom note with instructions for paying the ransom shows as a wallpaper file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by [email protected]

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss Masterlock Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

[email protected] Virus – How Does It Spread

To be replicated and infect the maximum amount of users this ransomware may use the same method used by it to communicate with it’s victims – e-mail. The virus may replicate via numerous fake e-mail messages aiming primarily to resemble legitimate services such as PayPal or others. To those e-mails may be attached the malicious payload carrying a file of Masterlock ransomware that may be other malware, an exploit kit or a javascript. In addition to that, Masterlock may also spread via several other methods such as malicious URLs posted online on social media or other websites, or even opened automatically on your browser as a result of having an ad-supported (PUP) application on your computer.

[email protected] Virus – More Information

When it is installed on your computer, the Masterlock ransomware may create one or more files in the typical important Windows directories:

  • %SystemDrive%
  • %AppData%
  • %Temp%
  • %Startup%
  • %Roaming%
  • %Local%

After creating it’s malicious payload, the virus may set the file(s) to run automatically on system startup by modifying the Run registry keys for Windows machines:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ RunServices
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\Setup

In those keys, a string value may be used that leads to the location of the files, for example:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run “{filename}= {location of the file/filename.exe(bat, dll, tmp, etc)}

After the malicious file which encrypts modules is ran, the Masterlock virus may begin to encipher files of the following file types:

→“PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX .INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”Source:fileinfo.com

Not only this, but the Masterlock ransomware may also change the wallpaper prompting users to contact it’s distinctive e-mail [email protected] When a user contacted the cyber-criminals, the response from them was the following:

→ “Hello, dear friend!
We are writing to inform you that our team of network security specialists has analyzed your system and has identified vulnerabilities in the protection.
We kindly draw your attention that defensive operation on your computer is not running properly, and now the whole database is at risk.
All your files are encrypted and can not be accepted back without our professional help.
Obviously, vulnerability analysis, troubleshooting, decoding the information and then ensuring safety are not a simple matter.
And so our high-grade and quick service is not free.
Please note that today the price of your files recovery is 3 Bitcoins, but next day it will cost 5 Bitcoins.
You should buy bitcoins here https://localbitcoins.com/faq
Read the paragraphs:
1. How to buy Bitcoins?
2. How do I send Bitcoins and how can I pay with Bitcoins after buying them?
The Bitcoin wallet for payment is 12yDGpp82ejLqT6GbE4qAPtCYAKRpksbWd
After the transfer of bitcoins, please send an email with a screenshot of the payment page.
We do not advise you to lose time because the price will increase with each passing day.
As proof of our desire and readiness to help you, we can decipher a few of your files for the test.
To check this you can upload any one encrypted file on web site dropmefiles.com, size no more than 10 MB (only one text file or a photo) and send us a download link.
Certainly, after payment we guarantee prompt solution of the problem, decrypt the database to return to its former condition and consultation how to secure the rules of the system safety.
Kind regards, Master Lock.”

After the files of the user have been locked, the virus also appends it’s own file name to them, that includes the .crypt file extension, for example:

masterlock@india-com-encrypted-file-sensorstechforum

Remove [email protected] Ransomware and Restore .crypt Files

To fully erase the Masterlock virus from your computer, it is strongly advisable to guide yourself by following the removal instructions after this article. In case you are not sure that you can remove the virus manually, malware researchers and reverse engineers always advise using an advanced anti-malware software that will perform this activity swiftly and automatically.

To restore files that have been encrypted by Masterlock ransomware, users have reported that Rannoh Decryptor by Kaspersky was able to restore some of their files. We advise downloading it from step “3.Restore files encrypted by [email protected]” below and attempting to decrypt your files only after removing the virus. In case this Kaspersky decrypter does not work for you, it is strongly advisable to attempt using the other file restoration alternatives in the step.

Manually delete [email protected] from your computer

Note! Substantial notification about the [email protected] threat: Manual removal of [email protected] requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove [email protected] files and objects
2.Find malicious files created by [email protected] on your PC
3.Fix registry entries created by [email protected] on your PC

Automatically remove [email protected] by downloading an advanced anti-malware program

1. Remove [email protected] with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by [email protected] in the future
3. Restore files encrypted by [email protected]
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.