The Brotherhood Ransomware - Remove and Restore .ransomcrypt Files

The Brotherhood Ransomware – Remove and Restore .ransomcrypt Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

How to Remove The Brotherhood ransomware and restore .ransomcrypt files guide sensorstechforum

This article provides information about a ransomware dubbed The Brotherhood as well as descriptive steps how to remove its malicious files from the system. The threat encrypts important files and demands a ransom payment. By reaching the end of the article, you will know also which alternative data recovery methods may help you to restore a few to all of the .ransomcrypt files.

The Brotherhood ransomware infection plagues essential system settings in order to trigger its encryption module and corrupt important files stored on the PC. It is associated with the specific extension .ransomcrypt that stands at the end of all encrypted files’ names. At the moment of writing this article hackers demand the insane amount of 100 BTC in exchange for their decryption solution. Instructions on how to pay the ransom are introduced by a ransom note file called RansomNote.jpg.

Threat Summary

NameThe Brotherhood
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encodes target files with the help of sophisticated cipher algorithm and blackmails vistims into paying a 100 BTC ransom.
SymptomsImportant files are locked and renamed with .ransomcrypt extension. They remain unusable until an efficient solution restores them to the original state.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by The Brotherhood


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss The Brotherhood.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

The Brotherhood Ransomware – Distribution

The Brotherhood ransomware infection begins after its payload is started on a target host. In order for this to happen without your knowledge hackers bet on shady spread techniques that attempt to trick you to grant the malicious payload access to your system. The payload is usually an executable file that is started with the help of deceptive email attachments or malicious scripts embedded in the code of various web pages.

Hackers know that we all depend on our emails to receive the latest news important for us. And we receive many emails in our inbox on a daily basis. Knowing the facts bad actors often release massive email attack campaigns. The emails of these campaigns are designed to grab our attention, make us open them and interact with the elements they present. And their sole purpose is to trick us into opening the malicious code they carry on our devices. Hackers are experienced in exploiting human weaknesses so the messages they present in the emails aim to provoke a sense of urgency.

Furthermore, by spoofing the email sender and email address, they could easily pose as a representative of a well-known institution or business services like PayPal, DHL, FedEx, and Amazon.

As regards the compromised email elements they are usually file attachments presented as important documents, pictures, invoices, notifications, bills, taxes or in-text links that open a new web page in the browser. Once opened the compromised attachment or the corrupted web page automatically triggers an infection with the devastating The Brotherhood ransomware.

The Brotherhood Ransomware – Overview

The so-called The Brotherhood ransomware is a nasty infection that is designed to plague computer systems with the primary purpose to encrypt important files stored on the drives. Hackers use the threat to blackmail computer users into paying a ransom for a decryption solution. However, the malicious files and objects created during the attack may enable them to activate other malware on the system as well. As a result, they may steal sensitive credentials or use certain computer resources to mine for any cryptocurrency.

Like many other ransomware samples familiar to our team including LockOn, PokemonGO, and GruxEr, The Brotherhood is based on the code of HiddenTear. Being a derivative of this ransomware family The Brotherhood uses the sophisticated cipher algorithm AES to transform the original code of predefined types of files and this way restrict the access to the information they store. If you want to understand more about the encryption stage navigate to the next paragraph.

FYI: HiddenTear and EDA2 are widely accepted as the first open-source ransomware coded for educational purposes. This idea quickly turned out to be fishy, as it didn’t take long for cyber criminals to exploit the code for malicious operations.

In order to complete its main purpose which is data encryption the ransomware first needs to establish its malicious files on the system. By doing this it plagues essential system settings and attains persistent presence. Some of the changes are specially implemented to cause the automatic display of an image that depicts a ransom message. So at the end of the attack, a file named RansomNote.jpg could replace your desktop wallpaper to inform you of the following:

Your files have been encrypted. To decrypt your file, please transfer 100 BTC
to Bitcoin Address
Otherwise, you will lose your file today at 16:30:00hrs

the brotherhood ransomware ransom message RansomNote.jpg sensorstechforum

The Brotherhood Ransomware – Encryption Process

At the moment of reporting this threat we found out that the ransomware is in its development stage and eventually encrypts only the files stored in Documents folder. However, once hackers release its final version the threat is likely to be able to corrupt all of the files sored with the following extensions:

→.txt, .doc, .docx, .xls, .xlsx, .pdf, .pps, .ppt, .pptx, .odt, .gif, .jpg, .png, .db, .csv, .sql, .mdb.sln.php, .asp, .aspx, .html, .xml, .psd, .frm, .myd, .myi, .dbf, .mp3, .mp4, .avi, .mov, .mpg, .rm, .wmv, .m4a, .mpa, .wav, .sav, .gam, .log, .ged, .msg, .myo, .tax, .ynab, .ifx, .ofx, .qfx, .qif, .qdf, .tax2013, .tax2014, .tax2015, .box, .ncf, .nsf, .ntf, .lwp

Every single file that gets encrypted will be locked with the AES encryption algorithm and renamed with the specific .ransomcrypt extension. Once encrypted the files could not display the information they originally store. This devastating impact enables hackers to demand a ransom payment in exchange for the decryption solution they possess.

However, keep patience and don’t rush to pay them the demanded amount. Since there are alternative approaches to restore .ransomcrypt files there is no need to support their malicious activities. So be advised to check thoroughly the guide that follows. It may help you to resolve the problem by yourself.

Remove The Brotherhood Ransomware and Restore .ransomcrypt Files

Below you could find how to remove The Brotherhood step by step. To remove the ransomware manually you need to have a bit of technical experience and ability to recognize traits of malware files. Beware that ransomware is a threat with highly complex code that plagues not only your files but your whole system. So as recommended by security researchers you need to utilize an advanced anti-malware tool for its complete removal. Such tool will keep your system protected against devastating threats like The Brotherhood and other kinds of malware that endanger your online security.

After you remove the ransomware make sure to check the “Restore Files” step listed in the guide below. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share