A ransomware named Zepto, because of the extension it adds to encrypted files, has been seen by researchers recently. Seemingly related to the Locky ransomware, Zepto uses the same ransom note. Another such crypto-virus, which might be spreading with the same malicious campaign is Bart Ransomware. To know how to remove Zepto ransomware and see how to try to restore your data, you should read the article through.
|Short Description||The ransomware uses 128-bit AES ciphers to encrypt files with an asymmetric algorithm to have a decryption key different than the encryption one.|
|Symptoms||The ransomware will lock all your files with .zepto extension appended to them and put a ransom note in your PC. The note states that you have to pay the equivalent of 300$ in Bitcoins for decryption.|
|Distribution Method||Spam Emails, Email Attachments, Suspicious Sites|
|Detection Tool|| See If Your System Has Been Affected by Zepto |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Zepto Ransomware|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Zepto Virus Video Removal Guide
Zepto Ransomware – How Did I Get Infected?
Zepto Ransomware – Further Inspection
Zepto is the name of a ransomware that appears to be a new variant of Locky ransomware. The Zepto ransomware is named after the extension it puts to encrypted files.
The ransomware possibly makes an entry in the Windows Registry for automatically loading upon the start of Windows:
→HKCU\Software\Microsoft\Windows\CurrentVersion\Run [exe name]
Right after your files get encrypted, the Zepto ransomware creates two files containing payment instructions. The files are:
You can see the picture of the ransom note:
The ransom note reads the following:
!!! IMPORTANT INFORMATION !!!
All of your files are encrypted with RSA-2048 and AES-128 ciphers.
More information about the RSA and AES can be found here:
Decrypting of your files is only possible with the private key and decrypt program, All which is on our secret server.
To receive your private key follow one of the links:
If all of this addresses are not available, follow synthesis steps:
1. Download and install Tor Browser: https://www.torproject.org/download/download-easy(.)html
2. After a successful installation, run the browser and wait for initialization.
3. Type in the address bar: mphtadhci5mrdlju(.)onion/D7F6EEB0D8FC508E
4. Follow the instructions on the site.
!!! Your personal identification ID: D7F6EEB0D8FC508E !!!
The sum of money wanted as ransom is 0.5 Bitcoins, which is a little over than 315 US dollars. The note indicates two web addresses using a Tor proxy where if you simply copy the links you can see their content. Inside are instructions for paying similar to that of Locky and Bart ransomware viruses. Do not pay the ransom as that will only support the criminals. No guarantee is there that paying will get your files back. The ransomware doesn’t use threats but simply give links to the paying websites.
The Zepto ransomware uses a 128-bit ciphers with 2048-bit AES algorithm for file encryption. The key is asymmetric, which means that is different than the encryption one and is sent to the ransomware makers. Zepto resembles Bart ransomware so much and it appeared almost at the same time. If the new Locky variant is sold on the black market, then the extensions which the ransomware encrypts could be the same as the Bart variant:
→.123, .3dm, .3ds, .3g2, .3gp, .602, .aes, .arc, .asc, .asf, .asm, .asp, .avi, .bak, .bat, .bmp, .brd, .cgm, .cmd, .cpp, .crt, .csr, .csv, .dbf, .dch, .dif, .dip,
.djv, .djvu, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .fla, .flv, .frm, .gif, .gpg, .hwp, .ibd, .jar, .java, .jpeg, .jpg, .key, .lay, .lay6, .ldf, .m3u, .m4u, .max, .mdb, .mdf, .mid, .mkv, .mov, .mp3, .mp4, .mpeg, .mpg, .ms11, .myf, .myi, .nef, .odb, .odg, .odp, .ods, .odt, .otg, .otp, .ots, .ott, .p12, .paq, .pas, .pdf, .pem, .php, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .psd, .rar, .raw, .rtf, .sch, .sldm, .sldx, .slk, .stc, .std, .sti, .stw, .svg, .swf, .sxc, .sxd, .sxi, .sxm, .sxw, .tar, .tbk, .tgz, .tif, .tiff, .txt, .uop, .uot, .vbs, .vdi, .vmdk, .vmx, .vob, .wav, .wb2, .wk1, .wks, .wma, .wmv, .xlc, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .zip
When the whole encryption procedure is complete, you will see that every file on your computer is renamed with symbols and has a new extension appended – .zepto. The symbols take hexadecimal characters from the ransomware ID of a victim, in a specific order. Locky ransomware had a similar renaming pattern when it came out.
Zepto ransomware is likely to erase the Shadow Volume Copies present on a Windows operating system. Keep on reading this article to see how you might restore your data to what it was before encryption.
Remove Zepto Ransomware and Restore .zepto Locked Files
If your computer is infected by the Zepto ransomware, you should have a little experience in dealing with malware removal. You should get rid of the ransomware as fast as you possibly can because it could encrypt more data and spread itself deeper over your current network. The recommended action for you is to remove the ransomware completely by following the step-by-step instructions given below.