.srpx File Virus – Remove and Restore Files

.srpx File Virus – Remove and Restore Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

README_TO_RESTORE_FILES_t7Q.txt .srpx file virus Serpent ransomware ransom note sensorstechforum

The .srpx file virus is designed to modify the original code of particular files stored on the computers it infects via the strong encipher algorithms AES-256 and RSA-2048. As .srpx file virus leaves all corrupted files completely unusable hackers can extort a ransom payment from victims who want to recover their data. Sure trait that a file is encrypted is the malicious extension .srpx appended at the end of its name. This malware is classified as a data locker ransomware and appears to be a new strain of the infamous Serpent which was released in February 2017.

By reading this article, you will find out how to deal with .srpx file virus removal and .srpx files recovery without the need to follow instructions is the README_TO_RESTORE_FILES_t7Q.txt ransom note.

Threat Summary

Name.srpx File Virus
Short DescriptionThe ransomware encrypts files on your computer and displays a ransom message afterward.
SymptomsThe ransomware will encrypt your files and show up a ransom note message with the demand of ransom that should be paid in BitCoin.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .srpx File Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .srpx File Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Delivery Approaches of .srpx File Virus

Cyber threats like .srpx crypto virus can be spread with the help of various vicious techniques. In most of the cases, spam emails remain the preferred one as it allows a variety of ways to trick users into installing the ransomware on their PCs. On the one hand, hackers can create crafted messages posing as legitimate service providers, on the other hand, they can attach infected files or present corrupted web links. Any interaction with that elements causes an automatic download of ransomware payload. Once it is on the computer, it can either infect the system immediately or request permission for particular additional action. Another delivery technique that may be used is malvertising. It involves the injection of malicious advertisements into legitimate online advertising networks and web pages.

Infection Flow of .srpx File Virus a.k.a Serpent Ransomware

The .srpx file virus is a new strain of Serpent ransomware which previously renamed corrupted files with .serpent file extension. The infection is triggered by a single executable file called Serpent.exe. However, .srpx file virus creates additional malicious files on the system in order to complete the attack. Files associated with the ransomware may be situated in the following folders:

  • %Temp%
  • %Roaming%
  • %UserProfile%
  • %AppData%

It may hide the presence of some malicious files by injecting them into any currently running system process.

The threat is also likely to modify Windows registry keys and set its payload to start automatically each time the Windows OS is powered on. Creating new values in keys like Run and RunOnce may support the displaying of its ransom note. The ransom note files are dropped in two different file types but both contain the same text:

==== NEED HELP WITH TRANSLATE? USE https://translate.google.com ====
================ PLEASE READ THIS MESSAGE CAREFULLY ================
Your documents, photos, videos, databases and other important files have been encrypted!
The files have been encrypted using AES256 and RSA2048 encryption (unbreakable)
To decrypt your files you need to buy the special software ‘Serpent Decrypter’.
You can buy this software on one of the websites below.
If the websites above do not work you can use a special website on the TOR network. Follow the steps below
1. Download the TOR browser https://www.torproject.org/projects/torbrowser.html.en#downloads
2. Inside the TOR browser brower navigate to : 3o4kqe6khkfgx25g.onion/ E5A78924-C9CD1137-FB02A7CA-27D45F
3. Follow the instructions to buy ‘Serpent Decrypter’
================ PLEASE READ THIS MESSAGE CAREFULLY ================

README_TO_RESTORE_FILES_t7Q.txt .srpx file virus Serpent ransomware ransom note sensorstechforum

This message can be found in files README_TO_RESTORE_FILES_t7Q.html and README_TO_RESTORE_FILES_t7Q.txt that are believed to be dropped on the Desktop. The HTML variant is likely to pop up on the PC screen at the end of the infection. In the payment web site is stated that the amount of the requested ransom is 0.25 bitcoins within seven days. After the 7th day, it rises to 0.75 BTC which equals to $1762.

Encryption Process of Serpent Ransomware

The new variant of Serpent ransomware could be called .srpx file virus because of the file extension of the same name it appends to each encrypted file. As its predecessor .srpx file virus is believed to be configured to encrypt more than 150 file extensions:

→.2011, .2012, .2013, .2014, .2015, .2016, .2017, .3dm, .7zip, .accd, .accdb, .accde, .accdr, .accdt, .aepx, .agdl, .aiff, .aspx, .back, .backup, .backupdb, .bank, .blend, .btif, .cdr3, .cdr4, .cdr5, .cdr6, .cdrw, .cfdi, .clas, .class, .cntk, .config, .craw, .db-journal, .db_journal, .ddoc, .ddrw, .defx, .design, .djvu, .docb, .docm, .docx, .dotm, .dotx, .dtau, .efsl, .erbsql, .fcpa, .fcpr, .flac, .flvv, .gray, .grey, .groups, .html, .iban, .ibank, .idml, .incpas, .indb, .indd, .indl, .indt, .int?, .intu, .java, .jpeg, .jsda, .kdbx, .kpdx, .laccdb, .lay6, .m2ts, .m3u8, .mbsb, .meta, .mhtm, .mone, .moneywell, .mpeg, .ms11, .myox, .nvram, .pages, .pcif, .php5, .phtml, .plus_muhd, .potm, .potx, .ppam, .ppsm, .ppsx, .pptm, .pptx, .prel, .prpr, .psafe3, .pspimage, .ptdb, .qb20, .qbmb, .qbmd, .qcow, .qcow2, .qdfx, .qmtf, .quic, .qwmo, .resx, .s3db, .safe, .sas7bdat, .save, .seam, .sldm, .sldx, .sqli, .sqlite, .sqlitedb, .tax0, .tax1, .tax2, .text, .tiff, .tt10, .tt11, .tt12, .tt13, .tt14, .tt15, .tt20, .vbox, .vbpf, .vhdx, .vmdk, .vmsd, .vmxf, .wallet, .xhtm, .xlam, .xlsb, .xlsm, .xlsx, .xltm, .xltx, .ycbcra, .zipx

The encryption is performed via combination of two strong cipher algorithms AES-256 and RSA-2048 which makes the decryption process almost impossible. All corrupted files remain unusable until the unique decryption key is applied to Serpent Decrypter. They are all marked with the malicious file extension .srpx.

Removae .srpx File Virus and Restore Data

Ransomware is a devastating threat that should be removed from the infected machine as soon as possible otherwise it can encrypt each newly created file and open serious security holes which make the system vulnerable to other malware. Below you can find a set of manual removal instructions for .srpx file virus. Beware that threat samples reveal that it has a really complex code so the removal process can be sort of challenging task even for tech savvy guys. That’s why the help of professional anti-malware tool is recommended for best results.

In step two under the automatic removal approach are suggested some alternatve ways that couls possibly restore part of the .srpx files.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share