Remove SNS Locker and Restore .RSNSLocked AES-256 Files - How to, Technology and PC Security Forum |

Remove SNS Locker and Restore .RSNSLocked AES-256 Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

SNSLocker-Wallpaper-sensorstechforum2Malware researchers have discovered a new ransomware, calling itself SNS Locker. The new enciphering malware encrypts files with .RSNSLocked file extension and uses a strong AES-256 encryption algorithm to encode a wide variety of files on the compromised computer. The ransomware then changes the wallpaper of the user with a random scary pic, notifying him to pay money to get his files back. The ransomware asks for 0.66 bitcoins which are approximately 300$.

Threat Summary

NameSNS Locker
Short DescriptionThe ransomware encrypts files with the RSA algorithm and AES cipher and asks a ransom for decryption.
SymptomsFiles are encrypted and become inaccessible. A ransom note with instructions for paying the ransom shows as Wallpaper and a notification window.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by SNS Locker


Malware Removal Tool

User ExperienceJoin our forum to Discuss SNS Locker.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

SNS Locker – Distribution

Malware researcher Mosh at has researched the ransomware and has established that In order to be successfully distributed out into the open SNS Locker is believed to be spread out via an SNS Locker.exe and SNSLOcker2.exe files with the following parameters:

→ “File name: SNSLocker.exe / Size: 635.0 KB / VT
MD5: c3cd8168f96e89998cab52b436c24b7d
SHA1: 3cbe96abba5269eb69093ebc07dd82e3091f0d3d
SHA256: 503b7d7a1348c3f03c789a5faca481bcd340e9be7cc602175fcbe513e864ffb8
FileName: SNSLOcker2.exe / Size: 796.0 KB / VT MD5: 3a27b49845a3ae4671fa69c2051c2cb6 SHA1: 71caed58a603d1ab2a52d02e0822b1ab8f1a9095 SHA256: 597a14a76fc4d6315afa877ef87b68401de45d852e38f98c2f43986b4dca1c3a”Source:

This executable may assume different names to be undetected manually, for example:

  • {random name}.exe
  • Svchost.exe
  • Notepad.exe
  • Your Confirmation.exe
  • Receipt.exe

It may be spread out via game cracks, other keygens, activators, malicious email messages sent out as spam and even by malicious links that have come up as a result of an adware causing redirects to them, such as DNS Unlocker, for example.

SNS Locker Ransomware In Detail

Researchers at Nyxbone blog have established that the SNS Locker ransomware heavily modifies the computers it infects. For starters, once executed, the ransomware connects to the following C&C(Command and Control) IP address:


The address appears to be based in Germany, and after SNS Locker connects to it, it immediately sends the following information from the infected computer:

  • Customly generated 8 character ID of the victim. (For example – yas9yc92)
  • Machine name.
  • Username.
  • Public IP address.
  • MAC Address.
  • Date.

The ransomware then begins to encrypt the files of the infected computer. It is reported to look for the following file types to encode:

→ .1pa, .3dm, .3g2, .3gp, .aaf, .accdb, .aep, .aepx, .aet, .ai, .ai, .aif, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bik, .bmp , .c, .cal, .cdr, .cdt, .cdx, .cgn, .class, .clk, .cmx, .cnt, .cpp, .cpt, .cpx, .cs, .csl, .csv, .cur, .dat, .db, .dbf, .des, .des, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .drw, .ds4, .dsf, .dwg, .dwg, .dxf, .efx, .eps, .eps, .fim, .fla, .flv, .fmv, .fpx, .fpx, .fx0, .fx1, .fxr, .gem, .gif, .gif, .h, .idml, .iff, .iif , .img, .indb, .indd, .indl, .indt, .ini, .inx, .iso, .jar, .java, .jpeg, .jpg”, .js, .lgb, .m3u, .m3u8, .m4u, .mac, .max, .mdb, .met, .mid, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .mx0, .nap, .nd, .pat, .pcd, .pct, .pcx, .pdb, .pdf, .pfb, .php, .pic, .plb, .plt, .pmd, .png, .pot, .potm, .potx, .pp4, .pp5, .ppam, .ppf, .ppj, .pps, .ppsm, .ppsx, .ppt, .ppt, .pptm, .pptx, .prel, .prn, .prn, .prproj, .ps, .ps, .ps, .psd, .psp, .ptb, .py, .qba, .qbb, .qbi, .qbm, .qbo, .qbp, .qbr , .qbw, .qbx, .qby , .qpd, .qsm, .qss, .qst, .qwc, .ra, .rar .raw, .raw, .rb, .rif, .rtf, .rtp, .sct, .sdf, .ses, .set, .shw, .sldm, .sldx, .sql, .svg, .svg, .swf, .swf, .tga, .tif, .tiff, .tlg, .tlg, .ttf, .txt, .txt, .txt, .v30, .vcf, .vob, .vsd, .vsd, .wav, .wav, .webm, .wi, .wk3, .wk4, .wma, .wmf, .wmv, .wpd, .wpd, .wpg, .wps, .xcf, .xla, .xlam, .xll, .xlm, .xls, .xls, .xlsb, .xlsm, .xlsm, .xlsx, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xpm, .xqx, .xqx, .zip Source:Nyxbone

The discovered files are encoded immediately with two of the most powerful ciphers in the world:

  • AES cipher to encrypt the files on the compromised computer.
  • RSA algorithm to encode the public AES key which is being sent to the criminals’ IP address.

The malicious software then changes the wallpaper image of the victim user to a terrifying picture, that may look like the following:


After this has been done, SNS Locker may automatically open a window with the ransom note and a method to decrypt the files by paying in BitCoin. It looks like the following:


SNS Locker also shows the user his own unique identification number which is most likely made to help the cyber-criminals identify multiple devices easily. Along with the number there is a button which may directly transfer the user to a payment page:


The payment page is rather simply created. It features the bitcoin address of the cyber-criminals in an electronic invoice which the user can pay online, from distance:


After the funds have been paid, the user may receive a link from the malicious domain of the cyber-criminals where he or she can find his private and public keys and click on the “Decypher” button to decrypt them:


SNS Locker – Conclusion, Removal, and Decryption Alternatives

The bottom line for SNS Locker is that it is basically a highly sophisticated ransomware which aims to basify the payment method for infected users, by being more “user-friendly”. This is a very effective method and it may have already made the cyber-criminals behind SNS Locker a lot of money. Despite that, malware researchers strongly advise hopeless users NOT to pay any ransom money due to the following possibilities:

  • You fund the cyber-crooks to infect even more computers.
  • You may not get your files back 100%.

To remove this ransomware effectively from your computer, we advise following the Manual or Automatic removal steps below. Experts also advise downloading a reputable anti-malware program which will automatically take care of the SNS Locker files for you.

Regarding file restoration, be advised that we have prepared some alternative methods in step “3” below that you may try while we investigate any decrypters which are publicly released and working. As soon as there is a solution, expect an update on this article’s web page.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share