Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove CrypMIC Ransomware Virus and Restore Encrypted Files

STF-crypmic-cryptxxx-ransomware-copycat-ransom-note

The ransomware CryptXXX was such a huge success for cyber criminals that others made a copycat version of it. The copycat is called CrypMIC, and it utilizes the same distribution method, while also using the same ransom note and payment sites. The biggest difference between them is that CrypMIC does not encrypt files with a specific extension and uses another encryption algorithm.

This may actually be the same version of Microsoft Decryptor ransomware or another version imitating it. However, there is plenty more information about the virus in this article.

To see how to remove the ransomware virus and what you could apply to recover your files, you should read the article carefully.

Threat Summary

NameCrypMIC
TypeRansomware
Short DescriptionA ransomware that imitates CryptXXX ransomware. Encrypts your files, but does not put any special extension to them compared to CryptXXX.
SymptomsThe ransomware encrypts files while it searches drives from D to Z along with any external or network drives. Uses the same ransom note and payment sites as CryptXXX.
Distribution MethodMalvertising, Compromised Websites, Exploit Kits
Detection Tool See If Your System Has Been Affected by CrypMIC

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CrypMIC.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

CrypMIC Ransomware – Distribution

CrypMIC ransomware uses an exploit kit for its distribution. The ransomware uses the Neutrino exploit kit as its entry point – same as CryptXXX. Other exploit kits could be used for distribution in the future – with malware campaigns from compromised sites or hijacked sub-domains. For now Neutrino is one of the most effective exploit kits and TrendMicro labs reported that it spreads the following ransomware families as well:

TeslaCrypt was also being delivered by Neutrino earlier this year, but as its authors released the master decryption key, and thus the attention has shifted to CryptXXX.

The CrypMIC ransomware has its payload stored in a .DLL file with a random name. Beware that this makes it easy to spread and besides the exploit kit, spam emails, social media and file sharing networks might be used as a delivery way as well. Be very careful in opening files, links and emails of unknown origin or that seem suspicious.

CrypMIC Ransomware – Technical Description

The CrypMIC ransomware is a copycat of CryptXXX. However, it has quite a few differences. For instance, it does not apply a persistence mechanism such as an auto-start feature. Another interesting thing is that it does not feature a lockscreen. However, it does employ a check routine for the presence of any Virtual Machines being run and sends that data over its C&C (Command and Control) server.

CrypMIC encrypts files with a strong algorithm, but does not put any extension to the encrypted files. After encryption is complete the following files are created:

  • README.TXT
  • README.HTML
  • README.BMP

The files are almost 100% the same as those of CryptXXX, as names and content, and serve the same purpose. The .html file is made just after the file encryption is finished. The file launches a browser to display the .html code. This makes the links inside clickable. This file makes copies of itself in directories with encrypted files. The file also has a .TXT and a .BMP version. The latter of the two is a picture which is set as a desktop background, but the screen does not get locked.

You can see the .BMP file right here:

STF-crypmic-cryptxxx-ransomware-copycat-ransom-note

We removed the hyperlinks from the image for safety purposes but know that they lead to the same payment sites for decryption as the CryptXXX virus. The links may differ per infected users, but will lead to those domains hosted by the original ransomware owners.

The file displayed above reads the following:

NOT YOUR LANGUAGE? USE https://translate.google.com

What happened to your files ?
All of your files were protected by a strong encryption with RSA4096
More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem)

How did this happen ?
!!! Specially for your PC was generated personal RSA4096 Key , both public and private.
!!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet.
!!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server

What do I do ?
So , there are two ways you can choose: wait for a _miracle_ and get _your_ PRICE DOUBLED! Or start obtaining *BITCOIN NOW! , and restore _YOUR_ _DATA_ easy way
If You have really valuable _DATA_, you better _NOT_ _WASTE_ _YOUR_ _TIME_, because there is _NO_ other way to get your files, except make a payment

Your personal ID:

For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: [Link to a site page]

If for some reasons the addresses are not availablweropie, follow these steps:

1 – Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en
2 – Video instruction: [Link to a site page] 3 – After a successful installation, run the browser
4 – Type in the address bar: [Link to a site page] 5 – Follow the instructions on the site

Following any of the links provided in that note, and you will see how a page such as the following will load:

STF-crypmic-cryptxxx-ransomware-copycat-decryption-site-service-page

If you enter your ID number will get you inside the payment system for the decryption service. There, you will see the following instructions:

STF-crypMIC-cryptxxx-microsoft-decryption-ransomware-decryption-payment-service-sites

CrypMIC ransomware asks the price of 1.2 BitCoins, to be paid as ransom. That is nearly 800 US dollars, which is very high as an initial payment. You will be given a period of 4 days to make the payment. If you don’t pay in that time frame, the price doubles and becomes 2.4 Bitcoins. No threats are made that your files can get lost after time.

Do NOT pay these criminals. CrypMIC ransomware is a copycat so you don’t know what will happen with your money if you do. Paying the ransomware is not a good option because the decrypter might not work as in the original ransomware variant.

The ransomware locks over 900 different file types. Some of the files that CrypMIC ransomware seeks to encrypt have these extensions:

→.3dm, .aes, .ARC, .asc, .asf, .asm, .asp, .avi, .bak, .bat, .bmp, .brd, .cgm, .class, .cmd, .cpp, .crt, .csr, .CSV, .dbf, .dch, .dcu, .dif, .dip, .djv, .djvu, .doc, .DOC, .docb, .docm, .docx, .DOT, .dotm, .dotx, .eml, .fla, .flv, .frm, .gif, .gpg, .hwp, .ibd, .jar, .java, .jpeg, .jpg, .key, .lay, .lay6, .ldf, .max, .mdb, .mdf, .mid, .mkv, .mml, .mov, .mp3, .mp4, .mpeg, .mpg, .ms11, .MYD, .MYI, .NEF, .obj, .odb, .odg, .odp, .ods, .odt, .otg, .otp, .ots, .ott, .PAQ, .pas, .pdf, .pem, .php, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .PPT, .pptm, .pptx, .psd, .qcow2, .rar, .raw, .RTF, .sch, .sldx, .slk, .sql, .SQLITE3, .SQLITEDB, .stc, .std, .sti, .stw, .svg, .swf, .sxc, .sxd, .sxi, .sxm, .sxw, .tar, .tar, .bz2, .tbk, .tgz, .tif, .tiff, .txt, .uop, .uot, .vbs, .vdi, .vmdk, .vmx, .vob, .wav, .wks, .wma, .wmv, .xlc, .xlm, .xls, .XLS, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .zip, .zipx

The encryption algorithm used here is AES 256-Bit, although the ransom note states it is RSA-4096. After the process, the virus sends information about the current state of the system and the result of encryption to its C&C server. It uses the TCP protocol on the 443 port. Over the C&C the ransomware can also do a check if a VM (Virtual Machine) is running and send that data back.

CrypMIC ransomware deletes Shadow Volume Copies with the Vssadmin in Windows.

To prevent ransomware (and other viruses) from infecting you again, you can refer to the ransomware prevention tips thread in our forums. Continue to read, to find out what you can try to do about a possible file decryption.

Remove CrypMIC Ransomware and Restore Encrypted Files

If your computer got infected with CrypMIC, you should have some experience in malware removal. You should get rid of CrypMIC ransomware as soon as you can because it will keep encrypting files found not only on your computer but the network your PC is connected to, as well. The recommended action to do is to remove this virus and follow the step-by-step instructions manual provided down here.

Manually delete CrypMIC from your computer

Note! Substantial notification about the CrypMIC threat: Manual removal of CrypMIC requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove CrypMIC files and objects.
2. Find malicious files created by CrypMIC on your PC.
3. Fix registry entries created by CrypMIC on your PC.

Automatically remove CrypMIC by downloading an advanced anti-malware program

1. Remove CrypMIC with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by CrypMIC in the future
3. Restore files encrypted by CrypMIC
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.