Remove BitPaymer Virus - Restore .LOCK Files

Remove BitPaymer Virus – Restore .LOCK Files

The article will help you to remove BitPaymer virus (with .LOCK extension) permanently. Follow the ransomware removal instructions given at the end of this article.

BitPaymer is the name of a cryptovirus. The ransomware is coded to put the extension .LOCK to all files after the encryption process is finished along with a text document containing the ransom note instructions for recovering your encrypted files. The BitPaymer virus demands for you to transfer a payment as a ransom to a Bitcoin address or write to them directly on either of the two email addresses appointed inside the ransom note file. Keep on reading below to see how you could try to potentially restore some of your files.

Threat Summary

NameBitpaymer (.LOCK)
TypeRansomware
Short DescriptionThe ransomware encrypts files on your computer and displays a ransom message afterward.
SymptomsThe ransomware will encrypt your files and put the extension .LOCK to them after it finishes its encryption process.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Bitpaymer (.LOCK)

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Bitpaymer (.LOCK).
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

BitPaymer Virus – Infection Spread

BitPaymer ransomware could spread its infection via various methods. A payload dropper which initiates the malicious script for this ransomware is being spread around the World Wide Web, and researchers have gotten their hands on a malware sample. If that file lands on your computer system and you somehow execute it – your computer will become infected. You can see the detections of such a file on the VirusTotal service displayed in a screenshot down below:

BitPaymer ransomware might also distribute its payload file on social media sites and services for file-sharing. Freeware which is found on the Web can be presented as helpful. Also, it could be hiding the malicious script for this cryptovirus. Don’t be opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems suspicious. You should read the tips for preventing ransomware found in our forum section.

BitPaymer Virus – Technical Analysis

BitPaymer is a virus that could encrypt your files and extort you to pay a ransom to get them back to their original state. Malware researchers have discovered multiple malware samples of the virus and have established that it is a newer variant of the BitPaymer family of ransomware viruses with a new method of encryption, and not specifically targeting corporations this time.

BitPaymer ransomware might make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows operating system.

The ransom note message that is placed in your computer after encryption and copied for every encrypted file can be seen in the below screenshot:

That ransom note is inside a file called HOW_TO_DECRYPT.txt and reads the following:

Your network has been penetrated.

All files on each host in the network have been encrypted with a strong algorythm.

Backups were either encrypted or deleted or backup disks were formatted.

We exclusively have decryption software for your situation

DO NOT RESET OR SHUTDOWN – files may be damaged.
DO NOT RENAME the encrypted and readme files.
DO NOT MOVE the encrypted and readme files.
DO NOT DELETE readme files.
This may lead to the impossibility of recovery of the certain files.

To get info(pay-to-decrypt your files) contact us at:

[email protected]
or
[email protected]

BTC wallet:
12y4KnZBuvRmux25tJKK4DMkxUDfuT32vw

To confirm our honest intentions.
Send 2 different random files and you will get it decrypted.
It can be from different computers on your network to be sure we decrypts everything.
Files should have both .LOCK extension of each included.
2 files we unlock for free.

The note of the BitPaymer ransomware states that your files are encrypted. If you want to get them back, the ransomware threatens that you have to pay up. In case you do any changes to the ransomware’s files or to your own, you are threatened that you will get your data erased, which seems like an empty threat just like the previous Bitpaymer Ransomware Virus variant.

The following two email addresses are used for contacting the cybercriminals directly:

You should NOT under any circumstances pay the ransom. Not only it is huge as a sum, but for a lot less you might find a solution to recover your files. If you pay, your files may not get restored, and nobody could give you a guarantee for that. Furthermore, giving money to cybercriminals is like supporting them and could likely motivate them to create more ransomware viruses and do similar criminal acts.

BitPaymer Virus – Encryption Process

The BitPaymer cryptovirus encrypts various files, but mainly files which have the following extensions:

→.bmp, .jpg, .jpeg, .png, .gif, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .mp3

Every single file that gets encrypted will receive an extension appended to it, which is .LOCK. That would be placed as a secondary extension and the ransomware won’t change the original file name and extension of files which it encrypts.

The encryption algorithms used are RSA and AES. An AES-256 key is used for each and every file, then the combination 0C0200000C020000 is added, which is finally wrapped up with by an embedded RSA-4096.

The BitPaymer cryptovirus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

In case the command stated above is executed that would make the encryption process more efficient as it will eliminate one of the ways for restoring your data. If your computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore your files.

Remove BitPaymer Virus and Restore .LOCK Files

If your computer got infected with the BitPaymer ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by Bitpaymer (.LOCK) and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Bitpaymer (.LOCK).
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Bitpaymer (.LOCK) follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Bitpaymer (.LOCK) files and objects
2. Find files created by Bitpaymer (.LOCK) on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by Bitpaymer (.LOCK)
Tsetso Mihailov

Tsetso Mihailov

Tsetso Mihailov is a tech-geek and loves everything that is tech-related, while observing the latest news surrounding technologies. He has worked in IT before, as a system administrator and a computer repair technician. Dealing with malware since his teens, he is determined to spread word about the latest threats revolving around computer security.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...