Venis ransomware is a cryptovirus that is currently in its development phase. Recently found by malware researchers, this virus is believed to be soon released as a fully functional ransomware. The cryptovirus already has a page set with the name “Venis” as the payment service available to victims. The ransomware creates a user profile on a compromised computer with an enabled Remote Desktop Connection. To see how to remove the virus and how you can try to restore your files if they got encrypted, read the article carefully.
|Short Description||The ransomware is still in a development phase, but it is designed to encrypt your files and point you to the website “venis.pw” from where the payment and decryption service are situated.|
|Symptoms||The ransomware deletes Shadow Volume copies and spawns a lot of processes, including a Remote Desktop connection.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by Venis |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Venis.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Venis Ransomware – Infection Spread
Venis ransomware can infect your PC using various spread methods. Spam emails might be spreading its payload file. Spam campaigns may be launched to send emails which will try to make you believe that they are important. In addition, they will state that they have files attached to them, which are urgent or contain the entire message which was too long to be conveyed in the body of the e-mail. If open the file, however, the malicious code inside will infect your computer.
The Venis ransomware might be spreading its payload file on sharing services or social media networks. It was already reported that the developer of the virus had put it in comments on various forums saying that it is a decryptor for the new Cerber ransomware virus. Do not open files from suspicious e-mails or links. Scan files with a security application and check their signatures and size before opening. You should check out more ransomware preventing tips on our forum topic.
Venis Ransomware – Technical Details
Malware researchers have found Venis ransomware recently. The ransomware creates a new account profile on the Windows Operating System, named TEST. It enables the Remote Desktop Connection service and adds an exception rule to the Windows Firewall with the following command:
→netsh advfirewall firewall add rule name=”Remote Desktop” dir=in protocol=tcp localport=3389 profile=any action=allow (PID: 3796)
After Venis ransomware executes its payload file it will modify an auto-execute functionality by setting up values in the Windows Registry. Such values are set inside newly-created entries in the registry and are designed to make the virus automatically start when Windows is booted. If your files are encrypted, as the ransomware is still in a development phase, you should see a ransom message displayed on your desktop. You can view that ransom note from the below image:
The note reads the following:
All your files has been encrypted with AES 2048. (Military Grade Encryption)
The key has been sent to our private server which we have access to.
There are no tools online that will allow you to decode your files for free.
The following info has been gathered about this PC.
Chrome Passwords/ Firefox Passwords
Skype History (Deleted and non deleted)
You have 72 Hours To Comply. (Each delay will cause a price increase)
Drives are completely wiped after this time period is finished while the info is released for the public. (Nothing is spared)
Send us a message at: (Email)
Email – [email protected]
The Venis ransomware virus currently uses the email address [email protected] as a contact with the cybercriminals. The encrypted e-mail service ProtonMail is becoming the popular choice for ransomware creators. And that will more than likely continue to be the case as that makes the job of law officers really hard about catching the crooks.
From the drop-down button found below, you can see a list with nearly 400 processes which Venis ransomware seeks to shut down once on a compromised machine. As you can see, the list contains processes of most Antivirus and adware programs that exist, including monitoring programs:
The Venis ransomware gives you a deadline of 72 hours to pay up and decrypt your data. The ransom note states that if the deadline passes, the copies of your files on the hackers’ servers will be deleted. Not only that, but it threatens to release all information gathered from your social media network profiles and other messages to the public. That is entirely possible if they manage to break your passwords and if you have conversations saved on your hard drive.
This is how the payment website looks like:
You shouldn’t think of paying the cybercriminals, as nobody can guarantee you will get all of your files back to normal after payment. The criminals can always make another ransomware or do other criminal acts with the financial support of victims who paid them. Besides, nothing stops them from extorting you further with your private conversations or releasing them publicly, outright.
The following list with file extensions has been found inside the code of Venis:
→.CSV, .DOC, .PPT, .XLS, .avi, .bak, .bmp, .dbf, .djvu, .docx, .exe, .flv, .gif, .jpeg, .jpg, .max, .mdb, .mdf, .mkv, .mov, .mpeg, .mpg, .odt, .pdf, .png, .pps, .pptm, .pptx, .psd, .rar, .raw, .tar, .tif, .txt, .vob, .wav, .wma, .wmv, .xlsb, .xlsx, .zip
The list given above with the various file extensions is most probably for file types that will become encrypted. That deduction comes from the fact that a .DLL file contains the payload of the virus, and such a file type won’t get encrypted. The files which will get locked by the ransomware will probably have one, and the same file extension appended to them. The ransomware claims to utilize a 2048-bit AES encryption algorithm which is impossible, as 512-bit will have errors and be unstable, let alone a bigger key size.
The Venis ransomware deletes the Shadow Volume Copies from the Windows operating system with the following command:
→vssadmin.exe delete shadows /all /Quiet
Continue reading and see in what ways you can try to restore some of your data files.
Remove Venis Ransomware and Restore Your Files
If your computer got infected with the Venis ransomware virus, you should have some experience in removing malware. You should get rid of this ransomware as fast as possible before it can have the chance to spread further and infect more computers. You should remove the ransomware and follow the step-by-step instructions guide given below. To see ways that you can try to recover your data, see the step titled 2. Restore files encrypted by Venis.