New ransomware has been detected by malware researcher Michael Gillespie (@demonslay335) which is very similar to the Xorist virus family but is not such. The virus has the objective to encrypt the files on your computer making them non-accessible to you, and it adds the .REVOLUTION file extension to them. Then, the virus drops a ransom note as an InfoFiles.txt which has the only purpose to notify the victims that they must pay for a decryption key after contacting the cyber-criminals via e-mail to “[email protected]”. If your PC has been attacked by this ransomware virus, we recommend that you read this article thoroughly and learn how to remove it and restore files that have been encrypted by it on your computer.
|Short Description||A file-encryption type of malware. Aims to extort the victims for their important files.|
|Symptoms||Encrypts the files adding the .REVOLUTION file extension after their own one. Drops ransom note, named InfoFiles.txt|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by .REVOLUTION Ransomware |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .REVOLUTION Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.REVOLUTION Ransomware Distribution Methods
The creators of the Xorist-like ransomware virus have used various tools to help them spread this ransomware infection to infect as many users as possible. They may upload the malicious files of .revolution file ransomware on torrent sites or suspicious software download sites, making them appear as if they were legitimate types of files, like software setups, game cracks, patches and others.
The primary method of spreading the .revolution file virus, however, may be via e-mails that resemble legitimate messages which claim to have an important attachment on them. One example of such e-mails may be seen below:
Besides invoices, receipts, the cyber-criminals may also use suspicious banking activity reports, just to get you to open the malicious attachment. The attachment may be uploaded to a Dropbox or other file-sharing site online or may be uploaded directly In the e-mail as an archive. It may contain the following files in it:
→ .exe .bat .vbs .wsf .js .hta .htm
Some e-mails may even have Microsoft Word documents that could contain malicious macros in them, meaning that after you open the document, it asks you to enable its content to read it and that is the moment when the script infects your computer with .revolution file ransomware.
.REVOLUTION Ransomware – Activity
As soon as it infects your computer system, the .revolution files virus may connect to a remote host and from it download it’s malicious files. The malicious files may be of different types and most likely reside in the following Windows locations:
After the files are dropped on the computer, the ransomware automatically executes them. Each file may have a different purpose. One of them may be a batch file (.bat) which could be executed as an administrator in the background without you noticing it. The file may run commands as an administrator in Windows. These commands may delete the shadow volume copies on the infected computer and may look somewhat like the following:
In addition to the files dropped is the ransom note of the .revolution ransomware, named InfoFiles.txt. It has the following message to victims:
All your important files were encrypted on this PC.
All files with .revolution extension are encrypted.
Encryption was produced using unique private key RSA-1024 generated for this computer.
To decrypt your files, you need to obtain private key + decrypt software.
The single copy of the private key, with will allow you to decrypt the files, is locate on a secret server on the internet.
To retrieve the private key, you need to contact us by email [email protected] send us an email your InfoFiles.txt file and wait for further instructions.
For you to be sure, that we can decrypt your files – you can send us a 1-2 not very big encrypted files and we will send you back it in a decrypted form free.
To send files you can use http://dropmefiles.com/
Do not waste your time! After 72 hours the main server will double your price!
Your personal id:
[redacted] E-mail address to contact us:
Reserve email address to contact us:
Other files dropped may be programmed with functions within them that may create registry entries (value strings) in the following Windows sub-keys, that run a program automatically on Windows start-up:
.REVOLUTION File Virus – Encryption Process
The .REVOLUTION ransomware claims to use RSA-1024 encryption in order to make the files unable to be accessed again. The files targeted by this ransomware infection are often used types of files. But .revolution file virus is also careful to skip encrypting files in the system folders of Windows so that it is possible for the victim to still use the computer. The files targeted for encryption may have the following file extensions embedded to them:
→ “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG” Source:fileinfo.com
After the encryption has completed, the ransomware virus adds the .revolution file suffix to the files, making them look like the following:
Remove Revolution Ransomware and Restore .revolution Encrypted Files
To fully remove this ransomware virus, it is strongly advisable to focus on following the instructions for removal below. Since manual instructions cannot guarantee that you will fully remove .revolution file virus, automatic removal is always recommended. The best way to remove .revolution ransomware automatically according to security experts is using an anti-malware software which will delete all objects associated with this virus and make sure your computer is protected in the future as well.
If you want to restore files, encrypted with the .revolution file extension, it is recommended to try out the methods in step “2. Restore files encrypted by .REVOLUTION Ransomware” below. They are in no way 100% effective for restoring all your files but may help recover most of your important files after all.