.Seoirse Files Virus (Restore Files) - How to, Technology and PC Security Forum | SensorsTechForum.com

.Seoirse Files Virus (Restore Files)

This article is created to help remove Seoirse ransomware and restore AES encrypted files instead of paying 0.5 BTC ransom fee.

Ransomware, discovered in December 2016, which has the Irish originating name Seoirse, actually encrypts the files on the computers using an AES (Advanced Encryption Standard) cipher. The ransomware demands victims to pay a hefty ransom fee of 0.5 BTC for the crooks to restore the encrypted files. Created by someone, calling him/herself Ricardo, the virus wishes happy birthday to Seoirse which in Irish means George. The virus has been oriented towards English-speaking users, and anyone affected by it are advised not to pay a dime. Furthermore, it is also strongly recommended for users to read the following article and learn how to remove Seoirse virus and try to restore the files.

Threat Summary



TypeRansomware Virus
Short DescriptionAims to encrypt the files on the compromised computer using an AES-256 encryption algorithm.
SymptomsThe virus will display an image stating the name Seoirse which in irish means George..
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Seoirse


Malware Removal Tool

User ExperienceJoin our forum to Discuss Seoirse.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Does Seoirse Ransomware Spread

For it to be successful during infection, the creators of the virus utilize a mixture of tools in order to generate and send a phishing e-mail message that has either a malicious attachment in it or a malicious URL pretending to be a legitimate web link or a button. Since the e-mails have a convincing message such as:

  • “Your receipt is ready.”
  • “Your order is confirmed.”
  • “Please check the invoice of your order.”

… users who do not have experience tend to fall for these tricks and become infected with Seoirse ransomware.

.Seoirse Virus – Activity Information

Amongst the many activities the Seoirse threat performs on the user PC, the virus aims to create a file, named “Seoirse Ransom.exe” which is most likely downloaded from it’s command and control server (

Fortunately, the file is detected by many antivirus programs at the moment, but the bad news it that cyber-criminals may change the obfuscation and make it undetectable if they wish so or have the resources. Yet another reason why you should not pay the ransom:

Amongst the files Seoirse ransomware encrypts are:

  • Documents of Microsoft Office.
  • OpenOffice files.
  • PDF documents.
  • Text files.
  • Database files.
  • Images.
  • Audio files.
  • Videos.

The ransomware is not reported to be highly spread, but the bad news is that it is not decryptable, meaning that researchers have not yet discovered mistakes in it’s encryption file. However, we will immediately update this article if decryption becomes available, and in the meantime we advise to follow the below-mentioned alternative methods to restore the files.

Restore Files Encrypted by .Seoirse Virus After Removing It

To restore the files, you need to back them up first, because the restoration process is a risky one. Then, it is strongly advisable to get rid of all traces of Seoirse ransomware before actually going into the decryption phase. To do this, we advise you to follow the removal instructions below. Experts advise if you lack extensive experience in malware removal to go and try using advanced anti-malware software to remove all objects belonging to this virus.

Then, you can try and use the alternative methods for file restoring in step “2. Restore files encrypted by Seoirse” below.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share