.Wlu Files Virus (Jaff Ransomware) Removal – Restore Files

.Wlu Files Virus (Jaff Ransomware) Removal – Restore Files

The article will aid you to remove .Wlu Files Virus effectively. Follow the .Wlu Files Virus removal instructions at the end.

The .Wlu file virus is actually the latest variant of the Jaff ransomware that encrypts data on your PC. .wlu is the new extension that will get appended to files after they get locked. The other thing which is notable in this variant of the cryptovirus is that it has a new ransom note. Keep on reading to see how you could try to potentially recover your data.

Threat Summary

Name.Wlu Files Virus (Jaff)
TypeRansomware, Cryptovirus
Short Description.Wlu file virus continues to spread by using the same tactics as its predecessor and encrypts files just as successfully as the last variant.
SymptomsThe virus will encrypt your files and put the .wlu extension on them after it finishes encrypting them.
Distribution MethodSpam Emails with attachments, Macro commands in fake documents
Detection Tool See If Your System Has Been Affected by .Wlu Files Virus (Jaff)

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .Wlu Files Virus (Jaff).
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.Wlu Files Virus – Update

Update! A decryption tool is now available for the .Wlu Files Virus! The tool is developed by Kaspersky and called RakhniDecryptor. It can be downloaded from the following link, wrapped inside a .zip archive: RakhniDecryptor.

.Wlu Files Virus – Delivery Ways

The .Wlu Files Virus keeps using the same delivery ways as those of its predecessor. Those ways mainly include spam e-mail campaigns that are spreading millions of emails, which have PDF files attached to them. One such PDF file looks like the following:

Inside the PDF, you will see that there is an embedded .docm file, which you will be asked to open. This is how that document file looks from the inside:

Once loaded, you will be asked to click on “Enable Editing” and then on “Enable Content”. Afterward, a macro script is loaded that will download the malicious executable for the .Wlu Files Virus. Macro commands are detected to download the virus from one of the following URL addresses:

  • billiginurlaub.com – GET /fgJds2U
  • david-faber.de – GET /fgJds2U
  • elateplaza.com – GET /fgJds2U
  • electron-trade.ru – GET /fgJds2U
  • fjjslyw.com – GET /fgJds2U
  • hr991.com – GET /fgJds2U
  • jinyuxuan.de – GET /fgJds2U
  • khaosoklake.com – GET /fgJds2U
  • minnessotaswordfishh.com – GET /af/fgJds2U
  • oliverkuo.com.au – GET /fgJds2U
  • pcflame.com.au – GET /fgJds2U
  • tdtuusula.com – GET /fgJds2U
  • williams-fitness.com – GET /fgJds2U

.Wlu Files Virus could also be distributing its payload via social media networks and file-sharing sites. Refrain from opening files after downloaded them, especially if they come from places such as suspicious emails and links from an unknown source. Beforehand, you should scan the files with a security tool.

.Wlu Files Virus – More Information

.Wlu files virus is in fact a new variant of the Jaff ransomware. That new variant keeps using the old payment page design as Locky, and the latest method for distribution same as Locky’s Loptr variant. Jaff is written on the “C” programming language.

The .Wlu file virus makes entries in the Windows Registry, with the probable aim of achieving a higher level of persistence or even for launching and repressing processes inside Windows. Such of these entries are designed in a way that will start the virus automatically with every booting of the Windows OS.

The ransom message will be displayed after the encryption process finishes with a picture that changes your current Desktop background. That ransom message will be put inside three files, which will be named:

  • README_TO_DECRYPTl.bmp
  • README_TO_DECRYPT.html
  • README_TO_DECRYPTl.txt

or

  • READMEwl.bmp
  • READMEwl.html
  • READMEwl.txt

All three files will have almost exactly the same content inside.
Here is how the ransom message looks like from the README_TO_DECRYPTl.bmp file:

From there you will be pointed to the Tor page, which has the same design as the one of Locky, but say “jaff decryptor™”.

Except the .bmp file that changes your Desktop background, there is also a text document with the ransom note left on your PC. The ransom note states the following:

/////////////////////////////////////////////////////////////////////////////////
Files are encrypted!
To decrypt flies you need to obtain the private
key.

The only copy of the private key, which will allow you to decrypt your
files, is located on a secret server
in the Internet.

1.
You must install Tor Browser:
https://www.torproject.org/download/download-easy.html.en

2.
After instalation, run the Tor Browser and enter address:
http://rktazuzi7hbln7sy.onion/

Follow the instruction on the website.

Your decrypt ID: [redacted]

//////////////////////////////////////////////////////////////////////////////

Apparently the .Wlu files virus demands you to pay 0.35630347 Bitcoin, which equals to 954 US dollars at the moment of writing this article. Despite that, you should NOT under any circumstances pay any money to the cybercriminals. Nobody can guarantee that you will get your files recovered from paying, nor that you won’t get your computer infected again in the future. Financially supporting those criminals will motivate them to create more ransomware viruses.

.Wlu Files Virus – Encryption Process

As previous variants of the Jaff ransomware, this one also seeks to encrypt files with about 427 different extensions as seen below:

→.xlsx, .acd, .pdf, .pfx, .crt, .der, .cad, .dwg, .MPEG, .rar, .veg, .zip, .txt, .jpg, .doc, .wbk, .mdb, .vcf, .docx, .ics, .vsc, .mdf, .dsr, .mdi, .msg, .xls, .ppt, .pps, .obd, .mpd, .dot, .xlt, .pot, .obt, .htm, .html, .mix, .pub, .vsd, .png, .ico, .rtf, .odt, .3dm, .3ds, .dxf, .max, .obj, .7z, .cbr, .deb, .gz, .rpm, .sitx, .tar, .tar, .gz, .zipx, .aif, .iff, .m3u, .m4a, .mid, .key, .vib, .stl, .psd, .ova, .xmod, .wda, .prn, .zpf, .swm, .xml, .xlsm, .par, .tib, .waw, .001, .002 003, ., .004, .005, .006, .007, .008, .009, .010, .contact, .dbx, .jnt, .mapimail, .oab, .ods, .ppsm, .pptm, .prf, .pst, .wab, .1cd, .3g2, .7ZIP, .accdb, .aoi, .asf, .asp, . aspx, .asx, .avi, .bak, .cer, .cfg, .class, .config, .css, .csv, .db, .dds, .fif, .flv, .idx, .js, .kwm, .laccdb, .idf, .lit, .mbx, .md, .mlb, .mov, .mp3, .mp4, .mpg, .pages, .php, .pwm, .rm, .safe, .sav, .save, .sql, .srt, .swf, .thm, .vob, .wav, .wma, .wmv, .xlsb, .aac, .ai, .arw, .c, .cdr, .cls, .cpi, .cpp, .cs, .db3, .docm, .dotm, .dotx, .drw, .dxb, .eps, .fla, .flac, .fxg, .java, .m, .m4v, .pcd, .pct, .pl, .potm, .potx, .ppam, .ppsx, .ps, .pspimage, .r3d, .rw2, .sldm, .sldx, .svg, .tga, .wps, .xla, .xlam, .xlm, .xltm, .xltx, .xlw, .act, .adp, .al, .bkp, .blend, .cdf, .cdx, .cgm, .cr2, .dac, .dbf, .dcr, .ddd, .design, .dtd, .fdb, .fff, .fpx, .h, .iif, .indd, .jpeg, .mos, .nd, .nsd, .nsf, .nsg, .nsh, .odc, .odp, .oil, .pas, .pat, .pef, .ptx, .qbb, .qbm, .sas7bdat, .say, .st4, .st6, .stc, .sxc, .sxw, .tlg, .wad, .xlk, .aiff, .bin, .bmp, .cmt, .dat, .dit, .edb, .flvv, .gif, .groups, .hdd, .hpp, .log, .m2ts, .m4p, .mkv, .ndf, .nvram, .ogg, .ost, .pab, .pdb, .pif, .qed, .qcow, .qcow2, .rvt, .st7, .stm, .vbox, .vdi, .vhd, .vhdx, .vmdk, .vmsd, .vmx, .vmxf, .3fr, .3pr, .ab4, .accde, .accdt, .ach, .acr, .adb, .srw, .st5, .st8, .std, .sti, .stw, .stx, .sxd, .sxg, .sxi, .sxm, .tex, .wallet, .wb2, .wpd, .x11, .x3f, .xis, .ycbcra, .qbw, .qbx, .qby, .raf, .rat, .raw, .rdb rwl, .rwz, .s3db, .sd0, .sda, .sdf, .sqlite, .sqlite3, .sqlitedb, .sr, .srf, .oth, .otp, .ots, .ott, .p12, .p7b, .p7c, .pdd, .pem, .plus_muhd, .plc, .pptx, .psafe3, .py, .qba, .qbr, .myd, .ndd, .nef, .nk, .nop, .nrw, .ns2, .ns3, .ns4, .nwb, .nx2, .nxl, .nyf, .odb, .odf, .odg, .odm, .ord, .otg, .ibz, .iiq, .incpas, .jpe, .kc2, .kdbx, .kdc, .kpdx, .lua, .mdc, .mef, .mfw, .mmw, .mny, .moneywell, .mrw, .des, .dgc, .djvu, .dng, .drf, .dxg, .eml, .erbsql, .erd, .exf, .ffd, .fh, .fhd, .gray, .grey, .gry, .hbk, .ibank, .ibd, .cdr4, .cdr5, .cdr6, .cdrw, .ce1, .ce2, .cib, .craw, .crw, .csh, .csl, .db_journal, .dc2, .dcs, .ddoc, .ddrw, .ads, .agdl, .ait, .apj, .asm, .awg, .back, .backup, .backupdb, .bank, .bay, .bdb, .bgt, .bik, .bpw, .cdr3, .as4

Each one of the files that gets encrypted will receive the same extension appended to them, and that is the .wlu extension. The encryption algorithms which are utilized by the ransomware are still believed to be RSA and AES.

The .Wlu Files virus could be set to delete the Shadow Volume Copies from the Windows Operating System by using the following command:

→vssadmin.exe delete shadows /all /Quiet

In the case that the above command is executed, it will make the file restoration potential smaller, if you try to use a recovery method that involves the Shadow Volume Copies. Keep on reading and check out what ways you could try to restore your data.

Remove .Wlu Files Virus and Restore Files

If your computer got infected with the .Wlu files virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Manually delete .Wlu Files Virus (Jaff) from your computer

Note! Substantial notification about the .Wlu Files Virus (Jaff) threat: Manual removal of .Wlu Files Virus (Jaff) requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove .Wlu Files Virus (Jaff) files and objects
2. Find malicious files created by .Wlu Files Virus (Jaff) on your PC

Automatically remove .Wlu Files Virus (Jaff) by downloading an advanced anti-malware program

1. Remove .Wlu Files Virus (Jaff) with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by .Wlu Files Virus (Jaff)
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.