VaultCrypt is a new ransomware infection that has been active mainly in Russia for the past month but is now spreading to English speaking countries. What makes VaultCrypt different than other infamous ransomware like CryptoWall 3.0 and CTB-Locker, is its effective file encryption technique based on the use of Windows batch files and GnuPG privacy software. Experts report that the English version of the ransomware is not quite finished yet, but English instructions can already be seen on the payment website.
What Makes VaultCrypt Different Than Other Ransomware?
Unlike other ransomware infections, VaultCrypt does not display the typical ransom message containing the payment details once it is installed. Instead, the threat scans the affected machine for ms office files, database files, pictures and zips archives and adds a .vault extension to encrypt them. As the user double-clicks an encrypted file, a pop-up message appears, stating that the file has been “Stored in Vault”. The victim needs to visit a certain website (restoredz4xpmuqr.onion) to get the decryption key.
The decryption website contains payment details and decryption instructions. The fee accounts to 1 Bitcoin ($270) and has to be paid in a seven-day period. If the required sum is not paid in a week, the cyber crooks increase the amount.
The File-Encryption Process
Experts have determined that the VaultCrypt is basically a large Windows batch file that utilizes VBS scripts and GnuPG privacy software to encrypt the files on the compromised PC. As the batch file gets infected, it would generate an RSA 1024 public and private key.
VaultCrypt targets files with the following extensions:
→*.xls,*.doc,*.pdf, *.rtf,*.psd, *.dwg, *.cdr,*.cd, *.mdb, *.1cd, *.dbf, *.sqlite,*.jpg,*.zip
Files that are not in certain folders will not be encrypted by the ransomware. Such are msoffice, Intel, Windows, and framework64.
During the file-encryption process, a batch file is also created. Its purpose is to execute a command to erase all Shadow Volume Copies on the infected PC and make it impossible for the victim to restore the unencrypted files.
The Public and the Private Key
The private key needed for the decryption of the victim’s files is stored in a vaultkey.vlt file. This file also contains configuration information, umber of encrypted files, and computer names. The collected data is used to present the PC user with a personalized page on the payment website.
The public encryption key, which is the same for all infected machines, is used to encrypt each victim’s private key so it would be impossible for the user to retrieve it without paying the ransom. The same master key is used to encrypt the CONFIRMATION.KEY file that contains a list of all the encrypted files.
Another offensive move skillfully planned by the creators of VaultCrypt is downloading a file from tj2es2lrxelpknfp.onion.city and saving it on the infected computer with the sole purpose to steal login information for the web pages visited by the user.
The Final Touch
VaultCrypt uses sDelete program by Microsoft to erase all possible files used in the encryption process. For this final step, the ransomware applies sixteen overwrites, which makes restoring the created key files through recovery tools almost impossible.
VaultCrypt’s C&C Server
Experts estimate the C&C server as quite sophisticated. It is currently located at https://restoredz4xpmuqr.onion. The user needs to register first, by uploading the VAULT.KEY file. The authorization follows automatically, generating a login ID and password. Both can be used in the future.
As the victims log in, they will be presented with information about the encrypted files, payment method and live chat support in case any questions arise.
VaultCrypt offers the victim to restore four files for free as a guarantee that the encrypted files will be restored following payment.
Most of the information on the website is in Russian, but there are also instructions in English.
How Does VaultCrypt Infiltrate Your System?
Like many other threats, VaultCrypt can enter the targeted system:
- Bundled with free of charge software available for download online
- As a link or attachment to a spam email message
- Through corrupted websites
- Through exploit kits hosted by malicious advertisements, other malware or compromised web pages
Is It Possible to Remove VaultCrypt from Your Computer?
The VaultCrypt infection can be eliminated with a competent anti-malware tool, but experts warn that restoring the encrypted files without paying the ransom is almost impossible. The only chance to restore the encrypted data is through backup. The specialists add that there is a small chance to restore some of the files deleted by the ransomware from the Shadow Volumes using a file recovery tool because VaultCrypt does not delete files securely.
Spy Hunter system scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the malware tool. Find Out More About SpyHunter Anti-Malware Tool
Attention! SensorsTechForum strongly recommends that all malware victims should look for assistance only by reputable sources. Many guides out there claim to offer free recovery and decryption for files encrypted by ransomware viruses. Be advised that some of them may only be after your money.
As a site that has been dedicated to providing free removal instructions for ransomware and malware since 2014, SensorsTechForum’s recommendation is to only pay attention to trustworthy sources.
How to recognize trustworthy sources:
- Always check "About Us" web page.
- Profile of the content creator.
- Make sure that real people are behind the site and not fake names and profiles.
- Verify Facebook, LinkedIn and Twitter personal profiles.
How to Remove VaultCrypt from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove VaultCrypt





Step 2: Uninstall VaultCrypt and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:



Step 3: Clean any registries, created by VaultCrypt on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by VaultCrypt there. This can happen by following the steps underneath:



Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Step 4: Scan for VaultCrypt with SpyHunter Anti-Malware Tool
Step 5 (Optional): Try to Restore Files Encrypted by VaultCrypt.
Ransomware infections and VaultCrypt aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.
Simply click on the link and on the website menus on top, choose Data Recovery - Data Recovery Wizard for Windows or Mac (depending on your OS), and then download and run the tool.
Get rid of VaultCrypt from Mac OS X.
Step 1: Uninstall VaultCrypt and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove VaultCrypt via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
→ ~/Library/LaunchAgents
/Library/LaunchDaemons
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 3 (Optional): Try to Restore Files Encrypted by VaultCrypt.
Ransomware infections and VaultCrypt aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.
Simply click on the link and on the website menus on top, choose Data Recovery - Data Recovery Wizard for Windows or Mac (depending on your OS), and then download and run the tool.
VaultCrypt FAQ
What is VaultCrypt ransomware and how does it work?
VaultCrypt is a ransomware infection - the malicious software that enters your computer silently and blocks either access to the computer itself or encrypt your files.
Many ransomware viruses use sophisticated encryption algorithm how to make your files inaccessible. The goal of ransomware infections is to demand that you pay a ransom payment to get access to your files back.
How does VaultCrypt ransomware infect my computer?
Via several ways.VaultCrypt Ransomware infects computers by being sent via phishing e-mails, containing virus attachment.
This attachment is usually masked as an important document, like an invoice, bank document or even a plane ticket and it looks very convincing to users.
After you download and execute this attachment, a drive-by download occurs and your computer is infected with the ransomware virus.
Another way, you may become a victim of VaultCrypt is if you download a fake installer, crack or patch from a low reputation website or if you click on a virus link. Many users report getting a ransomware infection by downloading torrents.
How to open .VaultCrypt files?
You can't. At this point the .VaultCrypt files are encrypted. You can only open them once they are decrypted.
Decryptor did not decrypt my data. What now?
Do not panic and backup the files. If a decryptor did not decrypt your .VaultCrypt files successfully, then do not despair, because this virus is still new.
One way to restore files, encrypted by VaultCrypt ransomware is to use a decryptor for it. But since it's a new virus, advised that the decryption keys for it may not be out yet and available to the public. We will update this article and keep you posted as soon as this decryptor is released.
How Do I restore ".VaultCrypt" files (Other Methods)?
Yes, sometimes files can be restored. We have suggested several file recovery methods that could work if you want to restore .VaultCrypt files.
These methods are in no way 100% guarantee that you will be able to get your files back. But if you have a backup, your chances of success are much greater.
How do I get rid of VaultCrypt ransomware virus?
The safest way and the most efficient one for the removal of this ransomware infection is the use a professional anti malware software. It will scan for and locate VaultCrypt ransomware and then remove it without causing any additional harm to your important .VaultCrypt files.
Also, keep in mind that viruses like VaultCrypt ransomware also install Trojans and keyloggers that can steal your passwords and accounts. Scanning your computer with an anti-malware software will make sure that all of these virus components are removed and your computer is protected in the future.
What to Do If nothing works?
There is still a lot you can do. If none of the above methods seem to work for you, then try these methods:
- Try to find a safe computer from where you can can login on your own line accounts like One Drive, iDrive, Google Drive and so on.
- Try to contact your friends, relatives and other people so that they can check if they have some of your important photos or documents just in case you sent them.
- Also, check if some of the files that were encrypted it can be re-downloaded from the web.
- Another clever way to get back some of your files is to find another old computer, a flash drive or even a CD or a DVD where you may have saved your older documents. You might be surprised what will turn up.
- You can also go to your email account to check if you can send any attachments to other people. Usually what is sent the email is saved on your account and you can re-download it. But most importantly, make sure that this is done from a safe computer and make sure to remove the virus first.
More tips you can find on our forums, where you can also asks any questions about your ransomware problem.
How to Report Ransomware to Authorities?
In case your computer got infected with a ransomware infection, you can report it to the local Police departments. It can help authorities worldwide track and determine the perpetrators behind the virus that has infected your computer. Below, we have prepared a list with government websites, where you can file a report in case you are a victim of a cybercrime:
Cyber-security authorities, responsible for handling ransomware attack reports in different regions all over the world:
- Germany - Offizielles Portal der deutschen Polizei
- United States - IC3 Internet Crime Complaint Centre
- United Kingdom - Action Fraud Police
- France - Ministère de l'Intérieur
- Italy - Polizia Di Stato
- Spain - Policía Nacional
- Netherlands - Politie
- Poland - Policja
- Portugal - Polícia Judiciária
- Greece - Cyber Crime Unit (Hellenic Police)
- India - Mumbai Police - CyberCrime Investigation Cell
- Australia - Australian High Tech Crime Center
Reports may be responded to in different timeframes, depending on your local authorities.