.stn File Virus Restore files (Satan 2 Ransomware)

.stn File Virus Restore Files (Satan 2 Ransomware)

This article is created to help you remove the 2nd version of Satan ransomware from your computer and restore .stn files encrypted by this ransomware.

A new version of Satan ransomware, detected out in the wild was released. The virus was first detected back in January the 19th and was reported to use Tor networking for the ransom instructions and payoff. This version uses directly leaves the e-mails stn_satan@aol.com or Satan-Stn@bitmessage.ch in it’s ransom note, named “0_HELP_DECRYPT_FILES.html” in which it demands 1 bitcoin to be paid in 24 hours otherwise the sum will double. In case you have become a victim of the .stn file virus, recommendations are to read this article thoroughly.

SensorsTechForum team is currently performing an ongoing investigation on Satan 2 ransomware. Expect an update on this article.

Threat Summary

Name.stn File Virus
Short DescriptionThe ransomware is put on the Web as a service (RaaS). It is also free to use, while it requires only a registration.
SymptomsThe ransomware encrypts files and will place the same .stn extension to all files after encryption finishes. Also drops a ransom note, named 0_HELP_DECRYPT_FILES.html.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .stn File Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .stn File Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Satan 2 Ransomware – How Does It Infect

The infection process of Satan ransomware is no different than the first version. The virus still uses spam e-mail messages with instructions in them to open the attachments, just like the example image below displays:

In the attachment there may be a document portrayed by the e-mail message to be an important invoice or other type of document that should be opened right away.

Besides spam mail, there may be multiple other methods via which this ransomware infection could be replicated and one of them Is if the infection has embedded loader that appears like a game patch, program legitimizing software or a fake setup of software. Such are usually uploaded online on suspicious websites or via hacked account on torrent websites.

Whatever the scenario, once the user opens the malicious file, the payload of the Satan 2 ransomware is dropped on the computer of the user. It consists of the following files:


.stn File Virus – Malicious Activity

The activity of the .stn ransomware involves multiple different actions, the first of which may be to delete the shadow volume copies on the infected computer. For this, the following commands in Windows Command Prompt are likely used:

→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

After this, the Satan 2 ransomware may begin to interfere with the Windows Registry editor, more specifically set multiple different malicious files to run when Windows starts up. This is achievable by modifying the following Windows registry sub-keys:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

In addition to this, the Satan ransomware variant using the .stn extension may also shut down or interfere with multiple critical Windows objects, like the following:

→ KERNEL32.dll

.stn File Virus – Encryption Activity

For the encryption process, this iteration of Satan Ransomware may use the AES-256 and RSA-2048 encryption algorithms. The AES cipher may be employed in order to encrypt the files themselves, generating symmetric decryption key. The RSA cipher then may be additionally employed to generate a public key assigned to the user and embed it within the files.

Image Source: Wikipedia

Satan 2 ransomware is believed to scan for and look for the following file types to encrypt:

→ .incpas, .mp4, .pab, .st6, .sas7bdat, .wmv, .backup, .drf, .ibank, .3ds, .odg, .cer, .tif, .cs, .dotx, .7z, .png, .bak, .ibz, .db3, .pbl, .3fr, .dxf, .nk2, .bkp, .mdf, .svg, .xlm, .3dm, .pct, .java, .pot, .sxi, .ibd, .sxw, .pspimage, .ppt, .kbx, .ppsm, .ndd, .txt, .pdb, .say, .backupdb, .fla, .swf, .asx, .accdt, .mp3, .ycbcra, .erf, .cr2, .pfx, .potx, .qby, .sqlite, .blend, .class, .pat, .odp, .gray, .qbw, .tib, .thm, .htm, .mos, .rm, .key, .std, .tlg, .lua, .pst, .sqlitedb, .grey, .cdr4, .dc2, .ce1, .ps, .tex, .eml, .xlam, .pages, .st8, .jar, .st7, .potm, .sdf, .db-journal, .pcd, .aspx, .rwl, .kpdx, .fmb, .xlr, .gry, .kc2, .oil, .moneywell, .xlk, .sti, .accdr, .oth, .c, .xml, .nd, .mdb, .pem, .erbsql, .bpw, .ffd, .ost, .pptm, .dwg, .zip, .qbm, .cdx, .des, .dng, .pdd, .cfp, .nyf, .cgm, .sldm, .xla, .odf, .raf, .crw, .mef, .raw, .x11, .nsd, .fff, .design, .dcs, .ptx, .al, .ns2, .bik, .back, .accdb, .nwb, .cpi, .ads, .odt, .sqlite3, .docm, .drw, .pl, .nx2, .fpx, .rdb, .otp, .msg, .accde, .agdl, .php, .csv, .py, .rtf, .ach, .sda, .ddd, .asf, .dotm, .cmt, .h, .hbk, .xlsx, .s3db, .tga, .wav, .iif, .dxb, .sql, .db, .sd0, .bgt, .djvu, .jpg, .doc, .craw, .mpg, .sxd, .kdc, .jpeg, .psafe3, .flac, .dtd, .act, .qba, .vob, .cdrw, .eps, .bkf, .mdc, .rar, .mov, .cdf, .m4v, .ab4, .bank, .pps, .cib, .dot, .dgc, .exf, .flv, .xlsb, .ddrw, .adb, .srw, .plc, .csh, .xls, .fxg, .otg, .pas, .xlt, .indd, .rwz, .xltx, .apj, .stw, .xltm, .orf, .ott, .qbb, .max, .cls, .obj, .docx, .dcr, .cdr3, .qbx, .pdf, .nef, .ots, .srt, .ddoc, .rat, .phtml, .m, .dbx, .nxl, .avi, .p12, .awg, .dbf, .ns3, .mmw, .prf, .wallet, .rw2, .jin, .odc, .qbr, .ppsx, .ns4, .wpd, .wps, .nsh, .dxg, .fhd, .dac, .wb2, .nrw, .odb, .ait, .jpe, .odm, .sldx, .fdb, .acr, .war, .oab, .sxc, .cpp, .r3d, .hpp, .asm, .st5, .stx, .xis, .dds, .xlsm, .p7c, .cdr5, .3g2, .mrw, .sr2, .html, .cdr, .idx, .st4, .bdb, .kdbx, .nsg, .der, .ods, .myd, .nop, .ppam, .pptx, .yuv, .xlw, .mfw, .nsf, .csl, .php5, .p7b, .crt, .asp, .srf, .jsp, .cdr6, .sxm, .iiq, .3gp, .ce2, .arw, .bay, .ai, .sxg, .psd, .3pr, .fh, .pef, .x3f, .sik, .bpp, .vmdk, .spi, .bup, .cvt, .bb, .fkc, .tjl, .dbk, .swp, .fb, .vib, .dtb, .bke, .old, .bkc, .jou, .rpb, .abk, .sav, .bkn, .tbk, .fbw, .vrb, .spf, .bk, .sbk, .umb, .ac, .vbk, .wbk, .mbk

After the encryption process by Satan ransomware has completed, the ransomware infection appends the .stn file extension to the files encrypted by it. The files appear like the following:

Source: Affected user

In addition to this, the ransom note of the ransomware is also dropped on the computer of the victim, this time directly directing the victim to pay the BitCoin address, instead of utilizing the Tor network for the ransom payoff:

Ransom note’s content:

What happened to my files ?
All of your personal files were encrypted using AES-256 and RSA-2048
Your personal ID

{custom key}

What does this mean ?
This means that the content of your files have been changed, you will not be able to use them, it is basically the same as losing them forever. However, you can still get them back with our help.
How can I get my files back ?
As said before, your files have been encrypted, in order to decrypt them, you’ll need the private key of the key pair that was generated when your files were encrypted. Decrypting your files is only possible with the private key and the decrypter.
To get the decryptеr you should:
pay for decrypt:
to send 1 bitcoin today (tomorrow 2 bitcoins) to bitcoin the address 1Nez7W9ashFL4BA7vHuA5aoaad9XtqHKCF
Here are our recommendations:

If you have no Bitcoin address register https://blockchain.info/wallet
fill up your wallet some of the ways:
Btcdirect.eu – Good service for Europe
Bittylicious.com – Bitcoins through Visa / MC or through SEPA (ЕС) transfer
Localbitcoins.com – Here you can find people who want to sell Bitcoins directly (WU, in cash, SEPA, Paypal u.s.).
Cex.io – buy bitcoins with Visa / Mastercard or Wire Transfer.
Coincafe.com – Designed for quick and easy service. Payment methods: Western Union, Bank of America, cash by FedEx, Moneygram, as money transfer
Bitstamp.net – well known and established Bitcoins seller
Coinmama.com – Visa / Mastercard
Btc-e.com – Bitcoins vendor (Visa / Mastercard, etc.)
If you have not found any bitcoins in your region, try to find them here:
Buybitcoinworldwide.com – International Bicoins Exchange Directory
Bitcoin-net.com – Another directory of Bitcoins sellers
Howtobuybitcoins.info – International Bicoins Exchange Directory
Bittybot.co/eu – Directory for countries of the European Union
write to Google how to buy Bitcoin in your country?

mail support stn_satan@aol.com or Satan-Stn@bitmessage.ch:
After the payment:

Send screenshot of payment to mail support stn_satan@aol.com or Satan-Stn@bitmessage.ch. In the letter include your personal ID (look at the beginning of this document).
After you will receive a decryptor and instructions

No Payment = No decryption
You really get the decryptor after payment
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, because each user’s unique encryption key

Remove Locky Remove Satan 2 Ransomware and Restore .stn Encrypted Files

For the removal process of Satan 2 ransomware infection, it is strongly advisable to backup the files encrypted by this virus. After this has been completed, recommendations are to follow the removal instructions below. They are created in order to help with the proper removal of the ransomware by isolating it first. In case manual removal is a challenge for you, recommendations are to focus on performing automatic removal with an advanced anti-malware program which will delete every file associated with Satan 2 ransomware and protect your computer from such threats in the future as well.

In case you want to restore encrypted files by Satan 2 ransomware, recommendations are to follow the alternative methods we have posted in step “2. Restore files encrypted by Satan 2” below. They may not be 100% effective in restoring your files, but may restore at least some of them until a decryptor is released for this infection.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

1 Comment

  1. AvatarRaj

    My pc also affected this ransomware please give me solution for decrypt my files.please give me solution my important data is encrypted.


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share