The article will aid you to remove .Wlu Files Virus effectively. Follow the .Wlu Files Virus removal instructions at the end.
The .Wlu file virus is actually the latest variant of the Jaff ransomware that encrypts data on your PC. .wlu is the new extension that will get appended to files after they get locked. The other thing which is notable in this variant of the cryptovirus is that it has a new ransom note. Keep on reading to see how you could try to potentially recover your data.
|Name||.Wlu Files Virus (Jaff)|
|Short Description||.Wlu file virus continues to spread by using the same tactics as its predecessor and encrypts files just as successfully as the last variant.|
|Symptoms||The virus will encrypt your files and put the .wlu extension on them after it finishes encrypting them.|
|Distribution Method||Spam Emails with attachments, Macro commands in fake documents|
|Detection Tool|| See If Your System Has Been Affected by .Wlu Files Virus (Jaff) |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .Wlu Files Virus (Jaff).|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.Wlu Files Virus – Update
.Wlu Files Virus – Delivery Ways
The .Wlu Files Virus keeps using the same delivery ways as those of its predecessor. Those ways mainly include spam e-mail campaigns that are spreading millions of emails, which have PDF files attached to them. One such PDF file looks like the following:
Inside the PDF, you will see that there is an embedded .docm file, which you will be asked to open. This is how that document file looks from the inside:
Once loaded, you will be asked to click on “Enable Editing” and then on “Enable Content”. Afterward, a macro script is loaded that will download the malicious executable for the .Wlu Files Virus. Macro commands are detected to download the virus from one of the following URL addresses:
- billiginurlaub.com – GET /fgJds2U
- david-faber.de – GET /fgJds2U
- elateplaza.com – GET /fgJds2U
- electron-trade.ru – GET /fgJds2U
- fjjslyw.com – GET /fgJds2U
- hr991.com – GET /fgJds2U
- jinyuxuan.de – GET /fgJds2U
- khaosoklake.com – GET /fgJds2U
- minnessotaswordfishh.com – GET /af/fgJds2U
- oliverkuo.com.au – GET /fgJds2U
- pcflame.com.au – GET /fgJds2U
- tdtuusula.com – GET /fgJds2U
- williams-fitness.com – GET /fgJds2U
.Wlu Files Virus could also be distributing its payload via social media networks and file-sharing sites. Refrain from opening files after downloaded them, especially if they come from places such as suspicious emails and links from an unknown source. Beforehand, you should scan the files with a security tool.
.Wlu Files Virus – More Information
.Wlu files virus is in fact a new variant of the Jaff ransomware. That new variant keeps using the old payment page design as Locky, and the latest method for distribution same as Locky’s Loptr variant. Jaff is written on the “C” programming language.
The .Wlu file virus makes entries in the Windows Registry, with the probable aim of achieving a higher level of persistence or even for launching and repressing processes inside Windows. Such of these entries are designed in a way that will start the virus automatically with every booting of the Windows OS.
The ransom message will be displayed after the encryption process finishes with a picture that changes your current Desktop background. That ransom message will be put inside three files, which will be named:
All three files will have almost exactly the same content inside.
Here is how the ransom message looks like from the README_TO_DECRYPTl.bmp file:
From there you will be pointed to the Tor page, which has the same design as the one of Locky, but say “jaff decryptor™”.
Except the .bmp file that changes your Desktop background, there is also a text document with the ransom note left on your PC. The ransom note states the following:
Files are encrypted!
To decrypt flies you need to obtain the private
The only copy of the private key, which will allow you to decrypt your
files, is located on a secret server
in the Internet.
You must install Tor Browser:
After instalation, run the Tor Browser and enter address:
Follow the instruction on the website.
Your decrypt ID: [redacted]
Apparently the .Wlu files virus demands you to pay 0.35630347 Bitcoin, which equals to 954 US dollars at the moment of writing this article. Despite that, you should NOT under any circumstances pay any money to the cybercriminals. Nobody can guarantee that you will get your files recovered from paying, nor that you won’t get your computer infected again in the future. Financially supporting those criminals will motivate them to create more ransomware viruses.
.Wlu Files Virus – Encryption Process
As previous variants of the Jaff ransomware, this one also seeks to encrypt files with about 427 different extensions as seen below:
→.xlsx, .acd, .pdf, .pfx, .crt, .der, .cad, .dwg, .MPEG, .rar, .veg, .zip, .txt, .jpg, .doc, .wbk, .mdb, .vcf, .docx, .ics, .vsc, .mdf, .dsr, .mdi, .msg, .xls, .ppt, .pps, .obd, .mpd, .dot, .xlt, .pot, .obt, .htm, .html, .mix, .pub, .vsd, .png, .ico, .rtf, .odt, .3dm, .3ds, .dxf, .max, .obj, .7z, .cbr, .deb, .gz, .rpm, .sitx, .tar, .tar, .gz, .zipx, .aif, .iff, .m3u, .m4a, .mid, .key, .vib, .stl, .psd, .ova, .xmod, .wda, .prn, .zpf, .swm, .xml, .xlsm, .par, .tib, .waw, .001, .002 003, ., .004, .005, .006, .007, .008, .009, .010, .contact, .dbx, .jnt, .mapimail, .oab, .ods, .ppsm, .pptm, .prf, .pst, .wab, .1cd, .3g2, .7ZIP, .accdb, .aoi, .asf, .asp, . aspx, .asx, .avi, .bak, .cer, .cfg, .class, .config, .css, .csv, .db, .dds, .fif, .flv, .idx, .js, .kwm, .laccdb, .idf, .lit, .mbx, .md, .mlb, .mov, .mp3, .mp4, .mpg, .pages, .php, .pwm, .rm, .safe, .sav, .save, .sql, .srt, .swf, .thm, .vob, .wav, .wma, .wmv, .xlsb, .aac, .ai, .arw, .c, .cdr, .cls, .cpi, .cpp, .cs, .db3, .docm, .dotm, .dotx, .drw, .dxb, .eps, .fla, .flac, .fxg, .java, .m, .m4v, .pcd, .pct, .pl, .potm, .potx, .ppam, .ppsx, .ps, .pspimage, .r3d, .rw2, .sldm, .sldx, .svg, .tga, .wps, .xla, .xlam, .xlm, .xltm, .xltx, .xlw, .act, .adp, .al, .bkp, .blend, .cdf, .cdx, .cgm, .cr2, .dac, .dbf, .dcr, .ddd, .design, .dtd, .fdb, .fff, .fpx, .h, .iif, .indd, .jpeg, .mos, .nd, .nsd, .nsf, .nsg, .nsh, .odc, .odp, .oil, .pas, .pat, .pef, .ptx, .qbb, .qbm, .sas7bdat, .say, .st4, .st6, .stc, .sxc, .sxw, .tlg, .wad, .xlk, .aiff, .bin, .bmp, .cmt, .dat, .dit, .edb, .flvv, .gif, .groups, .hdd, .hpp, .log, .m2ts, .m4p, .mkv, .ndf, .nvram, .ogg, .ost, .pab, .pdb, .pif, .qed, .qcow, .qcow2, .rvt, .st7, .stm, .vbox, .vdi, .vhd, .vhdx, .vmdk, .vmsd, .vmx, .vmxf, .3fr, .3pr, .ab4, .accde, .accdt, .ach, .acr, .adb, .srw, .st5, .st8, .std, .sti, .stw, .stx, .sxd, .sxg, .sxi, .sxm, .tex, .wallet, .wb2, .wpd, .x11, .x3f, .xis, .ycbcra, .qbw, .qbx, .qby, .raf, .rat, .raw, .rdb rwl, .rwz, .s3db, .sd0, .sda, .sdf, .sqlite, .sqlite3, .sqlitedb, .sr, .srf, .oth, .otp, .ots, .ott, .p12, .p7b, .p7c, .pdd, .pem, .plus_muhd, .plc, .pptx, .psafe3, .py, .qba, .qbr, .myd, .ndd, .nef, .nk, .nop, .nrw, .ns2, .ns3, .ns4, .nwb, .nx2, .nxl, .nyf, .odb, .odf, .odg, .odm, .ord, .otg, .ibz, .iiq, .incpas, .jpe, .kc2, .kdbx, .kdc, .kpdx, .lua, .mdc, .mef, .mfw, .mmw, .mny, .moneywell, .mrw, .des, .dgc, .djvu, .dng, .drf, .dxg, .eml, .erbsql, .erd, .exf, .ffd, .fh, .fhd, .gray, .grey, .gry, .hbk, .ibank, .ibd, .cdr4, .cdr5, .cdr6, .cdrw, .ce1, .ce2, .cib, .craw, .crw, .csh, .csl, .db_journal, .dc2, .dcs, .ddoc, .ddrw, .ads, .agdl, .ait, .apj, .asm, .awg, .back, .backup, .backupdb, .bank, .bay, .bdb, .bgt, .bik, .bpw, .cdr3, .as4
Each one of the files that gets encrypted will receive the same extension appended to them, and that is the .wlu extension. The encryption algorithms which are utilized by the ransomware are still believed to be RSA and AES.
The .Wlu Files virus could be set to delete the Shadow Volume Copies from the Windows Operating System by using the following command:
→vssadmin.exe delete shadows /all /Quiet
In the case that the above command is executed, it will make the file restoration potential smaller, if you try to use a recovery method that involves the Shadow Volume Copies. Keep on reading and check out what ways you could try to restore your data.
Remove .Wlu Files Virus and Restore Files
If your computer got infected with the .Wlu files virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.