Remove CrypMIC Ransomware Virus and Restore Encrypted Files - How to, Technology and PC Security Forum | SensorsTechForum.com
THREAT REMOVAL

Remove CrypMIC Ransomware Virus and Restore Encrypted Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by CrypMIC and other threats.
Threats such as CrypMIC may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

STF-crypmic-cryptxxx-ransomware-copycat-ransom-note

The ransomware CryptXXX was such a huge success for cyber criminals that others made a copycat version of it. The copycat is called CrypMIC, and it utilizes the same distribution method, while also using the same ransom note and payment sites. The biggest difference between them is that CrypMIC does not encrypt files with a specific extension and uses another encryption algorithm.

This may actually be the same version of Microsoft Decryptor ransomware or another version imitating it. However, there is plenty more information about the virus in this article.

To see how to remove the ransomware virus and what you could apply to recover your files, you should read the article carefully.

Threat Summary

NameCrypMIC
TypeRansomware
Short DescriptionA ransomware that imitates CryptXXX ransomware. Encrypts your files, but does not put any special extension to them compared to CryptXXX.
SymptomsThe ransomware encrypts files while it searches drives from D to Z along with any external or network drives. Uses the same ransom note and payment sites as CryptXXX.
Distribution MethodMalvertising, Compromised Websites, Exploit Kits
Detection Tool See If Your System Has Been Affected by CrypMIC

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CrypMIC.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

CrypMIC Ransomware – Distribution

CrypMIC ransomware uses an exploit kit for its distribution. The ransomware uses the Neutrino exploit kit as its entry point – same as CryptXXX. Other exploit kits could be used for distribution in the future – with malware campaigns from compromised sites or hijacked sub-domains. For now Neutrino is one of the most effective exploit kits and TrendMicro labs reported that it spreads the following ransomware families as well:

TeslaCrypt was also being delivered by Neutrino earlier this year, but as its authors released the master decryption key, and thus the attention has shifted to CryptXXX.

The CrypMIC ransomware has its payload stored in a .DLL file with a random name. Beware that this makes it easy to spread and besides the exploit kit, spam emails, social media and file sharing networks might be used as a delivery way as well. Be very careful in opening files, links and emails of unknown origin or that seem suspicious.

CrypMIC Ransomware – Technical Description

The CrypMIC ransomware is a copycat of CryptXXX. However, it has quite a few differences. For instance, it does not apply a persistence mechanism such as an auto-start feature. Another interesting thing is that it does not feature a lockscreen. However, it does employ a check routine for the presence of any Virtual Machines being run and sends that data over its C&C (Command and Control) server.

CrypMIC encrypts files with a strong algorithm, but does not put any extension to the encrypted files. After encryption is complete the following files are created:

  • README.TXT
  • README.HTML
  • README.BMP

The files are almost 100% the same as those of CryptXXX, as names and content, and serve the same purpose. The .html file is made just after the file encryption is finished. The file launches a browser to display the .html code. This makes the links inside clickable. This file makes copies of itself in directories with encrypted files. The file also has a .TXT and a .BMP version. The latter of the two is a picture which is set as a desktop background, but the screen does not get locked.

You can see the .BMP file right here:

STF-crypmic-cryptxxx-ransomware-copycat-ransom-note

We removed the hyperlinks from the image for safety purposes but know that they lead to the same payment sites for decryption as the CryptXXX virus. The links may differ per infected users, but will lead to those domains hosted by the original ransomware owners.

The file displayed above reads the following:

NOT YOUR LANGUAGE? USE https://translate.google.com

What happened to your files ?
All of your files were protected by a strong encryption with RSA4096
More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem)

How did this happen ?
!!! Specially for your PC was generated personal RSA4096 Key , both public and private.
!!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet.
!!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server

What do I do ?
So , there are two ways you can choose: wait for a _miracle_ and get _your_ PRICE DOUBLED! Or start obtaining *BITCOIN NOW! , and restore _YOUR_ _DATA_ easy way
If You have really valuable _DATA_, you better _NOT_ _WASTE_ _YOUR_ _TIME_, because there is _NO_ other way to get your files, except make a payment

Your personal ID:

For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: [Link to a site page]

If for some reasons the addresses are not availablweropie, follow these steps:

1 – Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en
2 – Video instruction: [Link to a site page] 3 – After a successful installation, run the browser
4 – Type in the address bar: [Link to a site page] 5 – Follow the instructions on the site

Following any of the links provided in that note, and you will see how a page such as the following will load:

STF-crypmic-cryptxxx-ransomware-copycat-decryption-site-service-page

If you enter your ID number will get you inside the payment system for the decryption service. There, you will see the following instructions:

STF-crypMIC-cryptxxx-microsoft-decryption-ransomware-decryption-payment-service-sites

CrypMIC ransomware asks the price of 1.2 BitCoins, to be paid as ransom. That is nearly 800 US dollars, which is very high as an initial payment. You will be given a period of 4 days to make the payment. If you don’t pay in that time frame, the price doubles and becomes 2.4 Bitcoins. No threats are made that your files can get lost after time.

Do NOT pay these criminals. CrypMIC ransomware is a copycat so you don’t know what will happen with your money if you do. Paying the ransomware is not a good option because the decrypter might not work as in the original ransomware variant.

The ransomware locks over 900 different file types. Some of the files that CrypMIC ransomware seeks to encrypt have these extensions:

→.3dm, .aes, .ARC, .asc, .asf, .asm, .asp, .avi, .bak, .bat, .bmp, .brd, .cgm, .class, .cmd, .cpp, .crt, .csr, .CSV, .dbf, .dch, .dcu, .dif, .dip, .djv, .djvu, .doc, .DOC, .docb, .docm, .docx, .DOT, .dotm, .dotx, .eml, .fla, .flv, .frm, .gif, .gpg, .hwp, .ibd, .jar, .java, .jpeg, .jpg, .key, .lay, .lay6, .ldf, .max, .mdb, .mdf, .mid, .mkv, .mml, .mov, .mp3, .mp4, .mpeg, .mpg, .ms11, .MYD, .MYI, .NEF, .obj, .odb, .odg, .odp, .ods, .odt, .otg, .otp, .ots, .ott, .PAQ, .pas, .pdf, .pem, .php, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .PPT, .pptm, .pptx, .psd, .qcow2, .rar, .raw, .RTF, .sch, .sldx, .slk, .sql, .SQLITE3, .SQLITEDB, .stc, .std, .sti, .stw, .svg, .swf, .sxc, .sxd, .sxi, .sxm, .sxw, .tar, .tar, .bz2, .tbk, .tgz, .tif, .tiff, .txt, .uop, .uot, .vbs, .vdi, .vmdk, .vmx, .vob, .wav, .wks, .wma, .wmv, .xlc, .xlm, .xls, .XLS, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .zip, .zipx

The encryption algorithm used here is AES 256-Bit, although the ransom note states it is RSA-4096. After the process, the virus sends information about the current state of the system and the result of encryption to its C&C server. It uses the TCP protocol on the 443 port. Over the C&C the ransomware can also do a check if a VM (Virtual Machine) is running and send that data back.

CrypMIC ransomware deletes Shadow Volume Copies with the Vssadmin in Windows.

To prevent ransomware (and other viruses) from infecting you again, you can refer to the ransomware prevention tips thread in our forums. Continue to read, to find out what you can try to do about a possible file decryption.

Remove CrypMIC Ransomware and Restore Encrypted Files

If your computer got infected with CrypMIC, you should have some experience in malware removal. You should get rid of CrypMIC ransomware as soon as you can because it will keep encrypting files found not only on your computer but the network your PC is connected to, as well. The recommended action to do is to remove this virus and follow the step-by-step instructions manual provided down here.

Note! Your computer system may be affected by CrypMIC and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as CrypMIC.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove CrypMIC follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove CrypMIC files and objects
2. Find files created by CrypMIC on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by CrypMIC

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...