This article has been created in order to show you how to remove the .OGONIA file virus, which is a CryptoMix ransomware variant and how to try and get back as many encrypted files as possible without having to pay the ransom to hackers.
A new variant of the CryptoMix ransomware family, known as the .OGONIA virus has been detected by malware researcher Marcelo Rivero to use file encryption and rename important files on the computers infected by it. The virus then drops a file, named HELP_INSTRUCTION.txt in which it asks to contact [email protected] in order to most likely pay a hefty ransom fee in BitCoins to get the files decrypted and working again. If you have become a victim of the ransomware form of online extortion, it is strongly advisable to not pay the ransom and read this article to learn how to safely remove the .OGONIA CryptoMix ransomware variant and how to restore as many files that have been encrypted by it as possible without paying a ransom.
|Short Description||Encrypts the files on your computer, making them seem corrupt. Asks a payment to be made via e-mail in order to get them to work once more.|
|Symptoms||Adds the .OGONIA file extension to the encrypted files and changes their names to random A-Z 0-9 a-z names. Drops a ransom note, named HELP_INSTRUCTION.txt.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
See If Your System Has Been Affected by .OGONIA Virus
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .OGONIA Virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.OGONIA Ransomware – How Does It Spread
For this virus to be effective it needs to enter your computer. To do this, the virus may use various obfuscation techniques and slither unnoticed on your computer. The cyber-criminals have designed multiple methods by which most ransomware viruses infect. One of them, which Is likely used by .OGONIA ransomware is via malicious e-mail spam messages. Such messages may trick you into opening the malicious files as they pose as legitimate documents or e-mail attachments.
Other methods by which one can become a victim of .OGONIA ransomware include opening fake setups, game cracks, key generators and other types of files uploaded on suspicious sites online.
.OGONIA File Virus – Analysis
Since this ransomware is a variant of the CryptoMix ransomware viruses it has almost identical activity once it enters your computer. It’s first activity is to drop the malicious files responsible for the activity of the virus on the infected computer. They are usually located in the important system folders of the OS under different names:
After dropping the files, the virus may also run them as background processes to perform it’s malicious activities. They may start with attacking the shadow volume copies on the victim PC and deleting them by executing a batch script that runs Windows Command Prompt as an administrator without you noticing it in the background. The script may execute the following command:
After having deleted the shadow copy backups, the .OGONIA virus may also add registry values that may be located in the following registry sub-keys responsible for running programs automatically when Windows starts:
In addition to this, the .OGONIA virus also drops it’s ransom note, named HELP_INSTRUCTION.txt. It has the following contents:
ALL YOUR FILES CRYPTED
FOR DECRYPT WRITE TO : [email protected]
.OGONIA File Virus – Encryption Process
The encryption process of the .OGONIA CryptoMix ransomware variant is belived to involve the following important files on the victim’s computer:
→ .sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt.
The virus is programmed to encrypt any type of file of the ones it scans for and make it no longer able to be opened. In addition to this, it also renames the files so that they can no longer be recognized as well. The files encrypted by .OGONIA virus look like the following:
Remove .OGONIA Files Virus and Restore Files
If you want to remove this virus, the first thing you should be doing beforehand is copying the .OGONIA encrypted files on a flash drive or other form of backup, despite the fact that they are already encrypted. After doing so, you can proceed to remove the virus, preferably by following the removal instructions below. They are divided in Automatic and Manual removal. Be advised that security researchers reccomend doing the removal automatically by scanning your computer with a ransomware-specific removal software to detect all the objects associated with the .OGONIA virus on your computer and removing them automatically and safely.
After removing this virus, you are left with renamed files which have to be recovered. We have posted alternative methods on how to restore as many files as possible without paying the ransom. They are located in step “2. Restore files encrypted by .OGONIA Virus” below. They are in no way 100% effective, but we have received reports of victims of ransomware on our forum that they have managed to restore most of their important files using one of the methods.
Manually delete .OGONIA Virus from your computer
Note! Substantial notification about the .OGONIA Virus threat: Manual removal of .OGONIA Virus requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.