Remove CryptoBubble Ransomware – Restore .Bubble Files
THREAT REMOVAL

Remove CryptoBubble Ransomware – Restore .Bubble Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by CryptoBubble and other threats.
Threats such as CryptoBubble may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article will aid you in removing the CryptoBubble ransomware fully. Follow the ransomware removal instructions provided at the bottom.

CryptoBubble is the name of a ransomware virus written in C# (MSIL). Some malware researchers believe that it originates from Italy. Your files get encrypted while having the extension .bubble appended to them. A ransom note appears in the form of a legitimate Windows error notification. The cybercriminals demand that you contact them by e-mail. Keep on reading below and find out what ways you could try to potentially recover some of your files.

Threat Summary

NameCryptoBubble
TypeRansomware
Short DescriptionThe ransomware encrypts files on your computer system with the DES algorithm, while it is written in C#.
SymptomsThis ransomware virus encrypts your files with the extension .bubble and demands that you contact the cybercriminals for paying a ransom to get them recovered.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by CryptoBubble

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CryptoBubble.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

CryptoBubble Ransomware – Ways of Delivery

CryptoBubble ransomware could be delivered in more than one way. However, the way that is the most widespread is via a payload dropper file which initiates the malicious script for the ransomware. A sample with the file executable preventivo.pdf.exe has been spotted by malware researchers and you can preview its analysis available on the VirusTotal service from down here:

The CryptoBubble ransomware might be using other ways to deliver the payload file, such as social media and file-sharing sites. Freeware applications found on the Internet could be promoted as helpful but also could hide the malicious script for this virus. Before opening any files after you have downloaded them, you should instead scan them with a security program. Especially if they come from suspicious places, such as emails or links. Also, don’t forget to check the size and signatures of such files for anything that seems out of place. You should read the ransomware prevention tips given in the forum.

CryptoBubble Ransomware – More Information

The CryptoBubble ransomware is a cryptovirus, which has been coded in C# (MSIL). CryptoBubble ransomware will pop up a window that serves as a ransom note with instructions, after it encrypts files on several locations on your PC. Malware researchers believe it originates from Italy.

CryptoBubble ransomware is set to make new registry entries in the Windows Registry to achieve a higher level of persistence. One of those entries is designed in a way that will start the virus automatically with every launch of the Windows Operating System, as clearly seen below:

→HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run [preventivo.pdf] = %path%\preventivo.pdf.exe

The ransom message will load up inside a legitimate looking Windows error notification pop-up as it can be seen in the below snapshot:

That text seen above is in actuality the full ransom note and it states:

Hello, I am Bob, do you remember the game? Unfortunately, the world has changed and I have changed too: once spit bubbles, today i encode your file! 🙂
Well, if you want to recover your files, please contact us at ‘[email protected]’ and we will find a solution and will promptly send you the unlock key to retrieve all your files… Good Lucky

The following e-mail addresses are left for contact:

The ransom sum that is demanded as payment for allegedly restoring your files is unknown. The ransomware does not seem that dangerous and there is no reason to contact its creators as you will see below. The ransomware is decryptable and if you pay the criminals you can only motivate them further to indulge in similar criminal activity.

CryptoBubble Ransomware – Encryption Process

CryptoBubble ransomware seeks to encrypt files with various extensions in different folders of your computer system. The following folders will have all important files inside them encrypted:

  • MyPictures
  • Personal
  • MyVideos
  • MyMusic
  • DesktopDirectory

The files that have the following extensions will get encrypted:

→.3gp, .ac3, .accdb, .accdt, .avi, .bmp, .cdr, .csv, .DivX, .doc, .docm, .docx, .dwg, .jpeg, .jpg, .mid, .mov, .mp3, .mp4, .mpeg, .mpg, .odb, .odf, .odg, .odp, .ods, .odt, .ogg, .ogv, .otg, .otp, .ott, .pdf, .png, .rar, .tiff, .txt, .wav, .xls, .xlsm, .xlsx, .zip

Extension list and encryption information source: www.tgsoft.it

All files that get encrypted will be deleted, copied with their original names and appended the .bubble extension. The encryption algorithm DES is used for locking the files and that is pretty mild compared to ransomware viruses nowadays. Thus, the CryptoBubble ransomware is actually decryptable.

The CryptoBubble cryptovirus is not set to erase the Shadow Volume Copies from the Windows Operating System, so you could actually restore your files partially or to a full extent using that Windows feature. Also, there are online decryptors of DES text over the Internet which could be of help, especially if you know that the first 50 lines of each encrypted file contain the following text:

→bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble…
bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble…
bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble… bubble bobble…

Inputting that text into an online DES dectyptor might give you the actual unlock key that is mentioned in the ransom note. If you want to try such a manipulation yourself, first make copies of your files. Otherwise, you can continue reading and see what else you can try to restore your files and remove the virus so it stops running and encrypting your data.

Remove CryptoBubble Ransomware and Restore .Bubble Files

If your computer got infected with the CryptoBubble ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by CryptoBubble and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as CryptoBubble.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove CryptoBubble follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove CryptoBubble files and objects
2. Find files created by CryptoBubble on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by CryptoBubble

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...