Remove Venis Ransomware and Restore Your Files

stf-venis-ransomware-2016-virus-encryption-main-page-for-ransom-payment

Venis ransomware is a cryptovirus that is currently in its development phase. Recently found by malware researchers, this virus is believed to be soon released as a fully functional ransomware. The cryptovirus already has a page set with the name “Venis” as the payment service available to victims. The ransomware creates a user profile on a compromised computer with an enabled Remote Desktop Connection. To see how to remove the virus and how you can try to restore your files if they got encrypted, read the article carefully.

Threat Summary

NameVenis
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware is still in a development phase, but it is designed to encrypt your files and point you to the website “venis.pw” from where the payment and decryption service are situated.
SymptomsThe ransomware deletes Shadow Volume copies and spawns a lot of processes, including a Remote Desktop connection.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Venis

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Venis.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Venis Ransomware – Infection Spread

Venis ransomware can infect your PC using various spread methods. Spam emails might be spreading its payload file. Spam campaigns may be launched to send emails which will try to make you believe that they are important. In addition, they will state that they have files attached to them, which are urgent or contain the entire message which was too long to be conveyed in the body of the e-mail. If open the file, however, the malicious code inside will infect your computer.

The Venis ransomware might be spreading its payload file on sharing services or social media networks. It was already reported that the developer of the virus had put it in comments on various forums saying that it is a decryptor for the new Cerber ransomware virus. Do not open files from suspicious e-mails or links. Scan files with a security application and check their signatures and size before opening. You should check out more ransomware preventing tips on our forum topic.

Venis Ransomware – Technical Details

Malware researchers have found Venis ransomware recently. The ransomware creates a new account profile on the Windows Operating System, named TEST. It enables the Remote Desktop Connection service and adds an exception rule to the Windows Firewall with the following command:

→netsh advfirewall firewall add rule name=”Remote Desktop” dir=in protocol=tcp localport=3389 profile=any action=allow (PID: 3796)

After Venis ransomware executes its payload file it will modify an auto-execute functionality by setting up values in the Windows Registry. Such values are set inside newly-created entries in the registry and are designed to make the virus automatically start when Windows is booted. If your files are encrypted, as the ransomware is still in a development phase, you should see a ransom message displayed on your desktop. You can view that ransom note from the below image:

stf-venis-ransomware-2016-virus-ransom-note-payment

The note reads the following:

VENIS

All your files has been encrypted with AES 2048. (Military Grade Encryption)
The key has been sent to our private server which we have access to.

There are no tools online that will allow you to decode your files for free.

The following info has been gathered about this PC.

Usernames
——–
Chrome Passwords/ Firefox Passwords
——–
Facebook Messages
——–
Skype History (Deleted and non deleted)
——–
Browser History
——–
Tor History

You have 72 Hours To Comply. (Each delay will cause a price increase)
Drives are completely wiped after this time period is finished while the info is released for the public. (Nothing is spared)
TO DECODE
Send us a message at: (Email)
==========================
[email protected]
==========================
Venis Ransomware
Email – [email protected]

The Venis ransomware virus currently uses the email address [email protected] as a contact with the cybercriminals. The encrypted e-mail service ProtonMail is becoming the popular choice for ransomware creators. And that will more than likely continue to be the case as that makes the job of law officers really hard about catching the crooks.

From the drop-down button found below, you can see a list with nearly 400 processes which Venis ransomware seeks to shut down once on a compromised machine. As you can see, the list contains processes of most Antivirus and adware programs that exist, including monitoring programs:

Full List of Processes

The Venis ransomware gives you a deadline of 72 hours to pay up and decrypt your data. The ransom note states that if the deadline passes, the copies of your files on the hackers’ servers will be deleted. Not only that, but it threatens to release all information gathered from your social media network profiles and other messages to the public. That is entirely possible if they manage to break your passwords and if you have conversations saved on your hard drive.

This is how the payment website looks like:

stf-venis-ransomware-2016-virus-encryption-main-page-for-ransom-payment

You shouldn’t think of paying the cybercriminals, as nobody can guarantee you will get all of your files back to normal after payment. The criminals can always make another ransomware or do other criminal acts with the financial support of victims who paid them. Besides, nothing stops them from extorting you further with your private conversations or releasing them publicly, outright.

The following list with file extensions has been found inside the code of Venis:

→.CSV, .DOC, .PPT, .XLS, .avi, .bak, .bmp, .dbf, .djvu, .docx, .exe, .flv, .gif, .jpeg, .jpg, .max, .mdb, .mdf, .mkv, .mov, .mpeg, .mpg, .odt, .pdf, .png, .pps, .pptm, .pptx, .psd, .rar, .raw, .tar, .tif, .txt, .vob, .wav, .wma, .wmv, .xlsb, .xlsx, .zip

The list given above with the various file extensions is most probably for file types that will become encrypted. That deduction comes from the fact that a .DLL file contains the payload of the virus, and such a file type won’t get encrypted. The files which will get locked by the ransomware will probably have one, and the same file extension appended to them. The ransomware claims to utilize a 2048-bit AES encryption algorithm which is impossible, as 512-bit will have errors and be unstable, let alone a bigger key size.

The Venis ransomware deletes the Shadow Volume Copies from the Windows operating system with the following command:

→vssadmin.exe delete shadows /all /Quiet

Continue reading and see in what ways you can try to restore some of your data files.

Remove Venis Ransomware and Restore Your Files

If your computer got infected with the Venis ransomware virus, you should have some experience in removing malware. You should get rid of this ransomware as fast as possible before it can have the chance to spread further and infect more computers. You should remove the ransomware and follow the step-by-step instructions guide given below. To see ways that you can try to recover your data, see the step titled 2. Restore files encrypted by Venis.

Manually delete Venis from your computer

Note! Substantial notification about the Venis threat: Manual removal of Venis requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Venis files and objects
2.Find malicious files created by Venis on your PC

Automatically remove Venis by downloading an advanced anti-malware program

1. Remove Venis with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by Venis
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.