Remove Death Bitches Ransomware and Restore Encrypted Files - How to, Technology and PC Security Forum | SensorsTechForum.com
THREAT REMOVAL

Remove Death Bitches Ransomware and Restore Encrypted Files

OFFER

SCAN YOUR MAC
with Combo Cleaner

Scan Your System for Malicious Files
Note! Your system might be affected by Death Bitches and other threats
Threats such as Death Bitches may be persistent. They tend to re-appear if not fully deleted. A malware removal tool like Combo Cleaner will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
Combo Cleaner’s scanner is free but the paid version is needed to remove the malware threats. Read Combo Cleaner’s EULA and Privacy Policy.

This article aims to help you remove Death Bitches virus from your computer and to try and restore the encrypted files.

Yet another ransomware variant has been detected out in the wild, calling itself Death Bitches . The virus most likely uses either AES or RSA encryption algorithms to encode the files on the computers it has compromised. Not only this, but the virus also aims to drop a ransom note that informs the user of his misfortune and the fact that he has to pay 1.5 BTC to get the files encrypted by Death Bitches ransomware.

Threat Summary

Name

Death Bitches

TypeRansomware
Short DescriptionRansomware virus, which encrypts the files on the compromised computer and then leaves a mocking ransom note.
SymptomsInstructions named Death Bitches pop-up demanding 1.5 BTC from the victim to pay to get the files back. Payment not advisable.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Death Bitches

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss Death Bitches.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Death Bitches Virus Infects

Death Bitches ransomware may use a technique similar to the Angry Duck ransomware. One of those tricks is to use phishing e-mails that pretend to be from a legitimate source, but in fact may contain a malicious web link in the form of a fake button, like the below-displayed fake LinkedIn invite.

Other forms of replication may include the usage of Malicious JavaScript in combination with malware obfuscators and exploit kits to spread the malware via malicious e-mail attachment or file sent via chat software or social media.

Death Bitches – What Happens After Infection

When the use clicks on a malicious URL or opens a malicious file, the virus may drop files in key windows folders, like the following:

  • %Local%
  • %Roaming%
  • %AppData%
  • %User’s Profile%

Furthermore, more files, like the ransom note of Death Bitches ransomware may be dropped in the %Startup% folder, to run every time Windows starts. In addition to this, the ransomware may also insert maliciously configured registry objects in the Windows Registry editor with the purpose of running the encryption on Windows boot.

If the file belonging to Death Bitches virus is executed, it may insert malicious code in legitimate Windows processes to allow the uninterrupted encryption of often-used videos, music, documents and other types of files. Amongst the many files encrypted by Death Bitches may be the following:

→ “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG” Source:fileinfo.com

After the encryption takes place, the files encoded can no longer be opened. Death Bitches then displays the following ransom note:

“Death Bitches
You have achieved something
You just got my little brand new ransomware
Anyways, lets talk about your files and PC
Your files are crypted with strong encryption that is literally uncrackable
Pay 1.5 BTC and I am going to decrypt your files.
Death, be not proud though some have called thee.
Mighty and dreadful, for thou art not so;
*You have got 47 hours to make a payment. If time is up, the your data is going to be deleted.”

Remove Death Bitches Ransomware and Restore Encrypted Files

Malware researchers advise not to pay any form of ransom and instead focus on removing this virus from your computer. Since it heavily modifies multiple different aspects of an infected machine, advises are to follow the removal instructions below. In case you are lacking the experience in interfering with registries and files created by malware, we advise using an advanced anti-malware program which will safely erase the malicious traces of Death Bitches ransomware from your computer.

After having removed Death Bitches virus, you may want to wait until a free decryptor is released and save the encrypted files in several copies. We will update this article if a decryptor is released, so this is why we suggest you to check regularly. In the mean-time as a part-time temporary solution, it is recommended to try and use the alternative file restoration methods with copies of the encrypted files. They are located below in step “2. Restore files encrypted by Death Bitches” and are no guarantee you will restore all your files but may work for at least some of them .

Note! Your computer system may be affected by Death Bitches and other threats.
Scan Your MAC with Combo Cleaner
Combo Cleaner is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Death Bitches.
Keep in mind, that Combo Cleaner needs to purchased to remove the malware threats. Click on the corresponding links to check Combo Cleaner’s EULA and Privacy Policy.

Manually delete Death Bitches from your Mac

1. Uninstall Death Bitches and remove related files and objects
2. Remove Death Bitches – related extensions from your Mac’s browsers

Automatically remove Death Bitches from your Mac

When you are facing problems on your Mac as a result of unwanted scripts and programs such as Death Bitches, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.


Download

Combo Cleaner

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...