Ransomware doesn’t sleep. Another crypto virus, Green_Ray ransomware, has been “introduced” to users, encrypting their files and demanding a payment for their decryption. Green_Ray has been reported to use asymmetric encryption (a public and a private key). The ransomware appends a green_ray(@)aol.com.xtbl extension. Paying the ransom is not advisory, since the victim may not receive a decryption key. Moreover, ransom payments only help malicious actors evolve their “business” and create even more threats.
|Type||Ransomware (Crypto Virus).|
|Short Description||The ransomware encrypts files with and demands a ransom.|
|Symptoms||Files are encrypted with the green_ray[@]aol.com.xtbl extension.|
|Distribution Method||Spam Emails, Email Attachments, File Sharing Networks.|
See If Your System Has Been Affected by Green_Ray Ransomware
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Green_ray Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Green_Ray Ransomware Distribution Method
As with most ransomware pieces, Green_Ray is highly likely distributed via aggressive spam emails and malicious URLs. Here is one example of malicious URL that shouldn’t be clicked:
Besides being spread in spam emails, malicious email attachments and via corrupted links, ransomware such as Green_Ray may rely on other distribution vectors as well:
- Peer-to-peer sharing networks, torrents;
- Bundling with other suspicious apps;
- Fake software updates, like Java or Flash;
- Exploit kits.
Green_Ray Ransomware Technical Overview
Once Green_Ray has entered the system successfully, it will change the victim’s desktop and create a “How to decrypt your files.txt” file. This file contains information to contact the ransomware operators. Two email addresses are provided:
As mentioned in the beginning, contacting the ransomware operators is not recommended. First, there are many cases of victims who have paid the ransom but never received a decryption key for their files. Second, ransomware has turned into a successful business partially because of victims’ payments.
For now, the amount of the ransom demanded by Green_Ray ransomware is not known. If you have any information about it, don’t hesitate to contact us. You can do this by leaving a comment in our security forums dedicated to malware problems.
Remove Green_ray Ransomware and Restore . green_ray[@]aol.com.xtbl Files
There is still no information if this ransomware affects Shadow Volume Copies. Nonetheless, recent crypto viruses are usually written to delete these copies and thus makе the file restoration process harder. If you have a clean backup of your files, you should try and recover them.
The removal steps below the article will provide you with assistance in case you decide to try and recover your files. But first, consider removing the ransomware via a strong anti-malware program.
Manually delete Green_Ray Ransomware from your computer
Note! Substantial notification about the Green_Ray Ransomware threat: Manual removal of Green_Ray Ransomware requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.