What is .MDEN files virus? What is MDEN ransomware? Can files encrypted by MDEN be recovered?
MDEN is the name of a new variant of the Matrix ransomware family. It is named so, due to it appending the .MDEN extension to files after their encryption. Files are locked with both AES 128-bit and RSA 2048-bit military grade encryption algorithms. After encryption the MDEN virus will place a ransom note message inside a file named “!MDEN_INFO!.rtf“. The MDEN cryptovirus is a variant of Matrix ransomware and it will demand money as a ransom to allegedly get your files restored. Keep on reading through the article to see how you could try to potentially recover some of your files.
|Name||.MDEN Files Virus|
|Short DeMDENiption||The ransomware encrypts files on your computer machine and demands a ransom to be paid to allegedly recover them.|
|Symptoms||The ransomware will encrypt your files with the help of the AES and RSA encryption algorithms. All locked files will have the .MDEN extension appended to them.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by .MDEN Files Virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .MDEN Files Virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.MDEN Files Virus – How Did I Get It and What Does It Do?
.MDEN Files Virus might spread its infection via a payload dropper, which initiates the malicious script for this ransomware. The virus might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Read the tips for ransomware prevention from our forum.
After encryption the MDEN virus will place a ransom note message inside a file named “!MDEN_INFO!.rtf“. You can see its contents from the following Screenshot given down here:
The ransom note states the following:
HOW TO RECOVER YOUR FILES INSTRUCTION
We are realy sorry to inform you that ALL YOUR FILES WERE ENCRYP‘I‘ED
by our automatic software. it became possible because of bad server security.
Please don‘t worry. we can help you to RESTORE your server to original
state and decrypt all your files quickly and safely!
Files are not broken!!!
Files were encrypted with AES-128+RSA-2048 crypto algorithms.
There is no way to decrypt your files without unique decryption key and special software. Your unique
decryption key is securely stored on our server. For our safety, all information about your server and your
decryption key will be automaticaly DELETED AFTER 7 DAYS! You will irrevocably lose all your data!
Please note that all the attempts to recover your files by yourself or using third party tools will result only in
irrevocable loss of your data!
Please note that you can recover files only with your unique decryption key, which stored on our side. If you
will use the help of third parties, you will only add a middleman.
HOW TO RECOVER FILES???
Please write us to the e-mail (write on English or use professional translator):
You have to send your message on each of our 3 emails due to the fact that the message may not reach
their intended recipient for a variety of reasons!
In subject line write your personal ID:
We recommed you to attach 3 encrypted files to your message. We will demonstrate that we can recover your
Please note that files must not contain any valuable information and their total size must be less than 5Mb.
Please be sure that we will find common languge. We will restore all the data and give you recommedations
how to configure the protection of your server.
We will definitely reach an agreement ;) !!!
if you dld not receive the answer from the aforecited emails for more then 24 hours please send us Bltmessages from a web browser
through the webpage https://bitmsg.me. Below is a tutorial on how to send bitmessage via web browser:
1. Open in your browser the link https://bitmsg.me/users/sign_up and make the registration by entering name email and password.
2. You must confirm the registration, return to your email and follow the instructions that were sent to you.
3. Return to site and click “Login” label or use link https://bitmsg.me/users/sign_in, enter your email and password and click the “Sign in“ button
4. Click the ‘Create Random address“ button.
5. Click the ‘New massage” button.
6. Sending message:
To: Enter address: BM-2cXRWRW5Jv5hxbhgu2HJSJrtPf92iKshhm
Subject: Enter your ID: [Redacted] Message: Describe what you think necessary.
Click the “Send message” button.
You should NOT under any circumstances pay any ransom sum.
The extortionists want you to pay a ransom for the alleged restoration of your files, same as with a lot of ransomware viruses. .MDEN Files Virus ransomware could make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows system. All encrypted will receive the .MDEN extension alongside a random generated one. That extension will be placed as a secondary one to each file and look something like .MDEN. Audio, video, image files as well as documents, backups and banking data can be encrypted by the ransomware.
The .MDEN Files Virus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:
→vssadmin.exe delete shadows /all /Quiet
If your computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore your files back to normal.
Remove MDEN Ransomware Virus and Restore .MDEN Files
If your computer got infected with the MDEN ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.