PClock4 Ransomware Virus Remove and Restore Instructions

PClock4 Ransomware Virus Remove and Restore Instructions

PClock4 virus, also known as PClock SysGop ransomware, is the latest iteration of the PClock ransomware family.

PClock ransomware virus has been around for quite some time. Previous infection campaigns were using the XOR algorithm to encrypt the user’s data. A previous PClock version of the ransomware family was also pretending to be Cryptolocker, relying on the famous ransomware’s name and fame. This old infection was reported to ask for 0.5 Bitcoin in exchange for file decryption. Let’s see what has been changed in PClock4 ransomware virus, in the table below:

Threat Summary

Name

PClock4

TypeScreenLock Ransomware
Short DescriptionPClock4, also known as PClock SysGop, uses the RSA-2048 encryption algorithm and targets a total of 2630 file type extensions. Reportedly it demands a ransom of 0.6 – 1.6 Bitcoin.
SymptomsThe victim’s files are encrypted. A screen locker function is embedded in the source code of PClock4 which gets in the way of any user activity on the targeted machine. A ransom message is displayed. For full text of the message, see the article.
Distribution Method Spam emails.
Detection Tool See If Your System Has Been Affected by PClock4

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss PClock4.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Unfortunately, in October researchers reported that there was no longer a way to decrypt newer PClock variants without the original decryption key possessed by criminals. The free decrypter coded by Fabian Wosar got broken when the ransomware authors updated their code. However, there still may be a chance for you to obtain access to your encrypted data via using powerful data recovery software or via data back ups.

There is no guarantee software data recovery attempts will be successful but in some cases users have shared positive results in restoring data partially. You will find data recovery solutions at the end of this article, where you will also be instructed on how to remove PClock both manually and automatically.

PClock 4 Ransomware Distribution Method

PClock4 has been reported to spread mainly in spam email campaigns. Such campaigns tend to become more intensive during the winter holidays season when people are less aware of potential online infections. The ransomware’s payload may be hiding in attached files appearing to be sent by legal organizations. Here are two examples of subject lines of PClock4 spam campaign:

  • PLEASE READ YOUR FAX T6931
  • Criminal case against you

Researchers report that the malware is attached in WSF files which contain the payload dropper – Crimace Trojan.

More particularly,a RAR archive contains a WSF file. When users download and open the archive, and execute the WSF file, a JScript function is set to initiate a series of operations that download and run a malware known as Crimace, known to be detected as TrojanDownloader:JS/Crimace.A.

The Trojan is a malware downloader, that connects to an online server and downloads and runs other malware such as PClock4. Other malware can be distributed the same way, too.

Besides being sent out in aggressive spam and phishing campaigns, the ransomware may be distributed in exploit kit operations.

PClock4 Ransomware – Further Technical Analysis

By comparing screenshots of PClock4 previous campaigns and the latest one described here, we will see that not much has changed. In other words, the ransomware hasn’t evolved, or at least no big changes have been observed. Here is an example of the latest campaign, provided by Microsoft:

The ransomware has been detected by Microsoft as Ransom:Win32/WinPlock.B or WinPlock, and is more commonly referred to as PClock. The first infections of the crypto virus were observed in 2015.

Emsisoft security researcher Fabian Wosar was able to create a decrypter for the earlier versions that enabled users to decrypt their files for free. Unfortunately, this is not the case any longer, as cybercriminals updated their code in May 2015 and broke the decrypter. The only way for PClock victims was to restore encrypted data from backup files or by paying the ransom, which is never recommended as it doesn’t guarantee any success. After all, don’t forget you are dealing with cybercriminals.

Interestingly, despite being known for more than 2 years, PClock has remained an entry-level operation even in the PClock4 iteration. The ransomware still requires its victims to get in contact with the authors via email, which is an ancient tactic. The only change in PClock4 appears to be the number of files targeted for encryption – it has jumped from 100+ files types, to 2,630.

Remove PClock4 and Restore Encrypted Files


PClock4
can be removed manually – the first half of PClock4 removal manual below will guide you through the process but keep in mind at least some experience in malware removal is needed. If you don’t feel confident enough, please refer to the instructions for PClock4 automatic removal.

Manually delete PClock4 from your computer

Note! Substantial notification about the PClock4 threat: Manual removal of PClock4 requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove PClock4 files and objects
2.Find malicious files created by PClock4 on your PC

Automatically remove PClock4 by downloading an advanced anti-malware program

1. Remove PClock4 with SpyHunter Anti-Malware Tool and back up your data
Optional: Using Alternative Anti-Malware Tools

Milena Dimitrova

An inspired writer, focused on user privacy and malicious software. Enjoys ‘Mr. Robot’ and fears ‘1984’.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...