Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove HydraCrypt Ransomware and Restore ID Encrypted Files

Infections have arisen by a crypto-virus known to encrypt user files with the HydraCrypt extension and a random id. The virus is very dangerous since it may encrypt all of the user files as soon as its activated and may even remove user backups as well. Furthermore, the crypto-malware may also be obfuscated from some antivirus programs. All users who have been affected should use an advanced anti-malware scanner to remove the malicious files and clean up the registry entries permanently.

NameHydraCrypt
TypeRansomware
Short DescriptionEncrypts user files, extorting for ransom money in return for the safe decryption of the data.
SymptomsThe user may witness his files to be come encrypted with the hydracrypt_ID_{random identifier} extension
Distribution MethodVia malicious email attachments or web links.
Detection ToolDownload Malware Removal Tool, to See If Your System Has Been Affected by HydraCrypt
User ExperienceJoin our forum to follow the discussion about HydraCrypt.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

hydracrypt-ransomware-sensorstechforum

HydraCrypt Ransomware – How Did I Get It

The crypto-malware is reported to be distributed via an exploit kit. Such kits are usually either embedded in malicious archives uploaded as email attachments or online downloads. The ransomware may also be distributed via malicious links sent by referral spam online such as the Snip(.)to spam . Such web links may also be featured in emails that are portrayed as a service the user is using with his e-mail (PayPal, a game or online retailer sites). There is also the possibility of this ransomware coming onto the user PC via a browser redirect caused by adware such as DNS Unlocker, for example.

HydraCrypt Ransomware – What Does It Do


The ransomware uses the following payload to infect users:

File extension: .exe
Approximate size: 164.0 KB ( 167,936 bytes )
MD5 hash: 08b304d01220f9de63244b4666621bba
SHA1 hash: b7f9dd8ee3434b35fbb3395f69ff43fd5112a0c6
SHA256 hash: afd3b729cf99fb9ea441f42862a4835d1d6eeb36ee535f9b206e3a00382c972e

Once it has been activated onto the user PC, the ransomware may drop files of the following types:

.exe, .tmp, .dll, .bat


The files may or may not contain random names, and they could be located in any of the following system folders:

%temp%
%System%
%Application Data%
%Users%

After the files have been dropped the ransomware may set a registry entry for the malicious files to run upon Windows startup in:

“HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run”

After this the ransomware encrypts the user’s files. It looks for files with the most commonly used file extensions, for example:

.DOC .DOCX .CSV .DAT .PPS .PPT .PPTX .M4A .MID .MP3 .MPA .WAV .WMA .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .BMP .DDS .GIF .JPG .PNG .PSD .TIFF .YUV .XLR .XLS .XLSX .DWG .DXF .HTM .HTML .JS .JSP .7Z .CBR .GZ .PKG .RAR .BIN .CUE .DMG .ISO

After the encryption is complete for a very short time, the ransomware removes the default file icon and sets an icon that is usually used when Windows files are damaged, incomplete or corrupt. Furthermore, it uses the .hydracrypt file extension along with a random id, after the files, for example:

New Microsoft Word Document.docx.hydracrypt_ID_128812e821e2

Upon trying to open the files, the user may either encounter the typical “file corrupt” error or the following window:

hydracrypt-file-error-sensorstechforum

After it encrypts the user files, the ransomware creates a .TXT file that is named README_DECRYPT_HYDRA_ID_{Random digits and letters}. The text states the following message:

“Attention!
All your files and documents were encrypted!
Encryption was made with a special crypto-code!
There is NO CHANCE to decrypt it without our special software and your unique private key!
To buy your software You need to contact us by EMAIL:
1)[email protected]
2)[email protected]
Your email text should contain your unique ID number and one of your encrypted file.
We will decrypt one of your file for FREE! It’s your guarantee!
Remember! Your time has a limit: 72 hour.
If You will not send any email We will turn on a sanctions:
1)Your sofware’s price will be higher
2)Your unique private key will be destroyed (After that your files will stay encrypted forever)
3)Your private info, files, documents will be sold on the Dark Markets
Attention: All your attempts to decrypt your PC without our software can destroy or damage your files!
ID:{Random digits and letters}”

This crypto-malware even features special poorly written message like the one above to further “assist” infected users with their “situation”. What is new is that the cyber criminals threaten to leak the information on the computer to the Dark Markets. However, all users who have this malware should immediately take actions against it instead of complying to the cyber-criminals’ scareware messages.

Remove HydraCrypt Ransomware

To erase this devastating crypto-malware completely without damaging your encrypted files any further, you should first disconnect your computer from the web and copy your files to an external drive. After this, we strongly advise following the step-by-step instructions below to locate all objects associated with the ransomware and delete them.

1. Boot Your PC In Safe Mode to isolate and remove HydraCrypt
2. Remove HydraCrypt with SpyHunter Anti-Malware Tool
3. Back up your data to secure it against infections and file encryption by HydraCrypt in the future
4. Restore files encrypted by HydraCrypt
Optional: Using Alternative Anti-Malware Tools
NOTE! Substantial notification about the HydraCrypt threat: Manual removal of HydraCrypt requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.