The Crypt888 ransomware cryptovirus is back and has a new variant called “Aviso”. The new variant targets users from Brazil, hence the ransom note is written in Portuguese. Aviso means “Warning” in Portuguese. The ransom note starts with that word in capital letters, placed on top, so it looks like a name. Thus, malware researchers have dubbed it this way.
The virus will encrypt files on a compromised computer and add a prefix to the encrypted files contrary to most ransomware viruses, which append extensions. To see how to remove the virus and how you can decrypt your locked files, read the article in full.
|Short Description||The virus is also known as Crypt888 and Mircop. It demands a ransom as payment for decrypting locked files. Different variants target specific countries.|
|Symptoms||The ransomware puts the prefix “Lock” in the file name of each encrypted file|
|Distribution Method||Spam Emails, Email Attachments, .Zip archives|
|Detection Tool|| See If Your System Has Been Affected by Aviso Virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Aviso Virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Aviso Ransomware – Infection Spread
The Aviso virus is targeted mainly at users from Brazil. That does not exclude the possibility for this ransomware to hit other countries. One of the main methods for spreading the infection relies on social engineering tactics and the targeted audience to speak Portuguese. A file called ENDESA_FACTURA.ZIP contains the payload file. Spam email campaigns usually spread that .zip archive as an attachment. The email will try to convince you that it is urgent for you to have a look in the attached document (called an invoice). Opening the file releases the virus, and your PC becomes infected.
The ransomware creators could be spreading the payload file not only with targeted attacks but through file-sharing networks and social media platforms as well. Do not open any executables or archives, especially if you received them in a suspicious email with an unknown origin. Always scan these types of files with security software and check them for their signatures and size beforehand. You should take a closer look at the ransomware preventing tips from our forum thread.
Aviso Ransomware – In-Depth Analysis
Malware researchers have discovered a new variant of the Crypt888 ransomware and have dubbed it “Aviso”. The latest version of the virus is primarily targeting Brazilian users and speakers of the Portuguese language. Among these victims, the new variant is most effective as its ransom note is written in Portuguese. You can look at the ransom note and why researchers gave the name Aviso to this threat, from the picture below:
The text in Portuguese reads:
TODOS os seus arqurvos foram BLOQUEADOS e esse bloqueio somente ser á DESBLOQUEAdo caso pague o valor de RS 2000.00 (Dois Mil Reais) em Bitcoons Após o pagamento desse valor, basta me enviar um pnnt para o email_
que estarei lhe enviando o programa com a senha para descryptografar/desbloquear o seus arquivos.
Caso o pagamento nao seja efetuado, todos os seus dados serao bloqueados
permanentemente e o seu computador será totalmente formatado
(Perdendo assim, todas as informa ções s contidas nele, incluindo senhas de email, bancarias…) O pagamento deverá ser efetuado nesse endereco de Bitcoin
This message is shown after the encryption of your files. The word “Aviso” translates into English as “Warning”. From the message it is also understood that you must pay 2000 Brazilian Reals to a Bitcoin address. That money amounts to 633 US dollars or exactly 1 Bitcoin according to today’s exchange rates. The email address [email protected] is given as a contact.
The Crypt888 cryptovirus first variant is known as Mircop ransomware and demanded the shocking sum of 48 Bitcoins. There are two more desktop backgrounds that are used by Crypt888 which come with the current variant, but they probably target other countries more than Brazil. You can see them below:
and this one
After executing its payload the Aviso variant of the ransomware could set new values in the Windows Registry for making itself more sustainable. Those values are put in entries of the registry and their aim is to make the virus start automatically with every boot of the Windows operating system. Next, the virus will encrypt files and show its ransom message demanding payment. A threat is put in the message stating that unless you pay your data will get formatted.
In any circumstance, you shouldn’t be thinking of paying these cybercriminals because paying them is not a solution. The extortionists will use that financial support for a new ransomware project and encrypt files again, maybe reaching more people. Researchers from AVG have a working decryptor utility for Crypt888 and they are positive that it works with Aviso. You can read more about it and decrypt files encrypted by Crypt888 ransomware from the corresponding article on our blog.
The Aviso variant of the virus encrypts nearly 100 file types, judging by the following list with different extensions:
→.3gp, .7z, .apk, .avi, .bmp, .cdr, .cer, .chm, .conf, .css, .csv, .dat, .db, .dbf, .djvu, .dbx, .docm, ,doc, .epub, .docx .fb2, .flv, .gif, .gz, .iso, .ibooks,.jpeg, .jpg, .key, .mdb, .md2, .mdf, .mht, .mobi, .mhtm, .mkv, .mov, .mp3, .mp4, .mpg, .mpeg, .pict, .pdf, .pps, .pkg, .png, .ppt, .pptx, .ppsx, .psd, .rar, .rtf, .scr, .swf, .sav, .tiff, .tif, .tbl, .torrent, .txt, .vsd, .wmv, .xls, .xlsx, .xps, .xml, .ckp, .zip, .java, .py, .asm, .c, .cpp, .cs, .js, .php, .dacpac, .rbw, .rb, .mrg, .dcx, .db3, .sql, .sqlite3, .sqlite, .sqlitedb, .psd, .psp, .pdb, .dxf, .dwg, .drw, .casb, .ccp, .cal, .cmx, .cr2
All encrypted files will have the prefix Lock put in front of them. For example, if a file named Document.docx is encrypted it will receive the name Lock.Document.docx. You can see that from the image on the right. The used encryption algorithm is unknown, but researchers have decrypted it.
The Aviso ransomware is very likely to delete the Shadow Volume Copies of the Windows operating system with the following command:
→vssadmin.exe delete shadows /all /Quiet
Continue reading to see how to remove this malware and check out ways in which to decrypt your data if the AVG decryptor didn’t work for you or you need alternatives for future-proofing your backup strategy.
Remove Aviso Ransomware and Restore “Lock” Files
If your computer got infected with the Aviso ransomware virus, you should have some experience in removing malware. You should get rid of this ransomware as fast as possible before it can have the chance to spread further and infect more computers. You should remove the ransomware and follow the step-by-step instructions guide given below. In case the decryptor from AVG doesn’t work, you can check out other ways to recover your data. For that, see the step titled 2. Restore files encrypted by Aviso Virus.