This article provides detailed information about ChinaYunLong ransomware, its complete removal from the infected PC and alternative .yl data recovery approaches.
ChinaYunLong is data locker ransomware that renames corrupted files with the malicious extension .yl and blackmails victims into paying ransom for the decryption key. At the end of infection, ChinaYunLong replaces desktop wallpaper with an image that depicts a figure with the famous Anonymous mask. Additionally, a window called China Yun Long pop ups on the screen. The text on the pop up is supposed to be the ChinaYunLong ransom note. However, it appears to be completely crabbed due to eventual encoding errors.
|Short Description||The ransomware encrypts files on your computer and displays an unreadable ransom message afterward.|
|Symptoms||The ransomware will encrypt your valuable files and rename them with the .yl file extension.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by ChinaYunLong |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss ChinaYunLong.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
ChinaYunLong Ransomware – Distribution
ChinaYunLong Ransomware – Overview
The infection process of ChinaYunLong ransomware begins once its payload is running on the system. The file is programmed to perform various system modifications, terminate and end processes to complete the attack. For the purpose, ChinaYunLong crypto virus is believed to establish a connection with its command and control server and then drop additional malware files on the PC. This connection can also be used for the data decryption key once it is generated. Data associated with the ransomware may be situated in the following folders:
- %USERPROFILE%\Desktop\China Yun Long.exe
- %PROGRAMFILES%\China Yun Long
- %PROGRAMFILES%\Second Resurrection
- %USERPROFILE%\Desktop\China Yun Long.exe
- C:\Second Resurrection.exe
Next ChinaYunLong can open Registry editor to create new values under the keys Run and RunOnce in order to set the automatic execution of its payload each time the Windows operating system starts. Some values created in these keys allow the ransomware to replace the desktop wallpaper with ransomware associated image and display its ransom message on the PC screen. The ransom note is contained in a window that depicts the popular “Anonymous” mask and text that cannot be read as it contains only strange symbols. It is programmed to appear as a pop-up window that is named China Yun Long.
On it is provided a field which probably should be used for the decryption key. The ransomware seems to be in development, and its detected samples may be released in a test campaign. Users whose machines are infected with ChinaYunLong ransomware are strongly advised to delete the threat and avoid ransom payment. Otherwise, you risk losing your money for a decryption key that is completely broken or missing at all.
ChinaYunLong Ransomware – Encryption
For the encryption process ChinaYunLong crypto virus first initiates a scan process of all drives. During the scan the ransomware compares each file stored on the system with files set as targets. Target data is predefined in its code as a list of various file extensions. The full list includes:
.7z, .asp, .avi, .bak, .doc, .docx, .dps, .e, .et, .excel, .h, .htm, .html, .jpg, .mp3, .mp4, .pdf, .php, .png, .ppt, .pptx, .rar, .txt, .word, .wps, .xls, .xlsx, .zip
ChinaYunLong encrypts frequently used files that contain valuable information like documents, images, photos, videos, music, archives, databases, projects and other.
Once the threat encrypts a file, it becomes completely unusable until the decryption key is applied. Corrupted data can also be recognized by the file extension .yl that is appended to the file name. At this point no information about the used encryption algorithm is available. Hopefully, security researchers will be able to crack the code of ChinaYunLong ransomware and release freely available decryption tool for .yl files. Meanwhile, after the ransomware removal, some alternative data recovery tools may be of a help for the encrypted files.
Remove ChinaYunLong Ransomware and Restore .yl Files
ChinaYunLong ransomware should be removed from the infected machine as it cannot be used regularly as long as the threat is running on it. Leaving the ransomware code on the PC will allow it to encrypt each new file you create and display its objects each time you start the Windows OS. Furthermore, once it is gone, you can try to recover part of .yl files by following our instructions in the guide below. The ChinaYunLong ransomware removal can be completed either manually or automatically.