This article provides information on how to remove easily RotorCrypt ransomware and how to restore .RAR files without paying the ransom.
Security researchers detected yet another version of RotorCrypt ransomware that is released in active attack campaigns. The threat encrypts files that store important information and appends the long extension !@#$_____ISKANDER@TUTAMAIL.COM_____$#@!.RAR to their names. Following encryption, the ransomware generated a ransom message to extort a ransom from victims.
|Short Description||A data locker ransomware that utilizes strong cihper algorithm to modify the original code of target files stored on the infected computer. It renders files unusable and demands a ransom payment.|
|Symptoms||Important files are locked and renamed with .RAR extension. A ransom message appears on PC screen and presents a contact email address.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by RotorCrypt |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss RotorCrypt.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
RotorCrypt Ransomware – Distribution
To infect users, this new RotorCrypt ransomware strain may be spread via several different methods. Some of the main are:
- Spam email messages that aim to trick into downloading malicious file attachment or clicking malicious URL that causes a drive-by-download attack
- Fake software updates, Windows system activators, game key generators and other scams that are designed to execute the malicious code after you click on them
- Infected USB driver or other external drives
RotorCrypt (v .RAR) Ransomware – Overview
Security researchers detected yet another version of RotorCrypt ransomware that is released in active attack campaigns. The main trait of this new iteration is the specific extension it uses to mark encrypted files. When it encrypts a file it renames it with a long string of symbols followed by an email and the .RAR extension at the end.
However, data encryption is not the only impact caused by RotorCrypt ransomware. Before encryption stage, the threat needs to establish its malicious files on the system and plague essential system settings. So along with its payload, several other files may be dropped or created on the system. They may reside in some of the following system folders:
When all target files are encrypted and marked with the extension .RAR, the ransomware generates a ransom note file called INFO.txt to instruct victims how to obtain the specific decryption key. The message is short and presents text written in Russian. All that it reads is:
Для связи с нами используйте почту
Translated in English the message reads:
For communication with us, use the mail
It lefts basic questions unanswered including: how much is the ransom, how it should be transferred, is there any time frame after which the amount increases? Supposedly the ransom amount varies between $100 and $1000. In most cases hackers demand it to be transferred in Bitcoin cryptocurrency.
The good news for you is that the code of this nasty ransomware was cracked by security researchers so you don’t need to contact hackers either to transfer them the ransom. When you reach the guide at the end you will find out how to secure your PC and decrypt .RAR files.
RotorCrypt Ransomware – Encryption Process
Data encryption module of the .RAR variant of RotorCrypt ransomware is believed to be the same as those of its predecessors. This means that target files may be encoded with RSA cipher algorithm that is known to generate two keys – a public and a private. For the decryption, you should have the private key. After the ransomware encrypts the last target file it sends the key to a remote server controlled by hackers. Happily, there is no need to worry that you don’t have this key. As mentioned in the previous paragraph at the end of our guide you will find a free decryption solution for all your .RAR files.
As regards the files which the .RAR version of RotorCrypt encrypts they are reported to be the following:
.1cd, .avi, .bak, .bmp, .cf, .cfu, .csv, .db, .dbf, .djvu, .doc, .docx, .dt, .elf, .epf, .erf, .exe, .flv, .geo, .gif, .grs, .jpeg, .jpg, .lgf, .lgp, .log, .mb, .mdb, .mdf, .mxl, .net, .odt, .pdf, .png, .pps, .ppt, .pptm, .pptx, .psd, .px, .rar, .raw, .st, .sql, .tif, .txt, .vob, .vrp, .xls, .xlsb, .xlsx, .xml, .zip
The ransomware follows specific pattern that includes four symbols, a contact email address and the extension .RAR at the end. For example if you have saved a file with the name lifegoal.docx following encryption the ransomware will rename it to lifegoal.docx!@#$_____ISKANDER@TUTAMAIL.COM_____$#@!.RAR
Remove RotorCrypt Ransomware and Restore .RAR Files
The removal of RotorCrypt ransomware demands a bit of technical experience and ability to recognize traits of malware files. And there is no doubt that you should remove this nasty threat from the infected PC as soon as you detect it. Otherwise, it has the chance to spread its infection files across the whole network. Below you could find how to remove it step by step. Beware that ransomware has highly complex code that could plague not only your files but your whole system. So as recommended by security researchers you need to utilize an advanced anti-malware tool for its complete removal. Such tool will keep your system protected against devastating threats like RotorCrypt and other kinds of malware that endanger your online security. After the removal phase, you can proceed to the second phase which aims to help you decrypt the .RAR encrypted files for free.
In order to fully erase RotorCrypt from your computer system, we have prepared manual and removal instructions which you can follow below. In the even that you are experiencing difficulties in manual removal, experts often advise to perform the removal automatically, preferably by downloading an advanced anti-malware software, which will make sure this malware is fully gone from your system and it remains protected against future infections as well.