X3M Cerber Decryptor Virus Restore _x3m _r90j and _locked Files - How to, Technology and PC Security Forum | SensorsTechForum.com

X3M Cerber Decryptor Virus Restore _x3m _r90j and _locked Files

This article aims to help you remove X3M Cerber Decryptor ransomware from your computer and restore files, encrypted with _x3m _r9oj or _locked file extensions.

A ransomware virus discovered in the beginning of January has been reported to use AES encryption algorithm to render the files on the computers it infects no longer openable. The virus aims to perform numerous activities on the victim’s computer, amongst which are to leave a ransom note and modify different components of it, to make it run on system startup. Despite that X3M ransomware demands “Cerber Decryptor”, the virus may have nothing to do with the original Cerber ransomware. The malware also demands 700 dollars payment to restore encrypted files, which is highly inadvisable. Instead we advise you to read the following article and learn how to remove X3M Cerber Decryptor virus and try to restore your files.

Threat Summary

Name

X3M

TypeRansomware
Short DescriptionThis virus imitates Cerber Ransomware and encrypts the files with an AES encryption algorithm to demand 700 dollars for decryption.
SymptomsChanged wallpaper to a ransom note. Advertises <> and <>.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by X3M

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss X3M.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How X3M Cerber Decryptor Infects

Similar to other ransomware viruses, such as the original Cerber ransomware, this virus uses quite the combination of tools and tricks up it’s sleeve that aim to ensure successful infection. One of those tools is software that ensures open ports on which to spam a given message and hence use it to deliver, extract and upload various shells. Another tool ensures fake database of web mails and e-mail accounts that have been tested before against spam defenses and filters. Furthermore, cyber-criminals may also use a pre-defined web list of victim accounts that are to be spammed. Usually more attractive are enterprise accounts because of the value of information in them. The cyber-criminals also have servers from which they control the infections and numerous pre-written phishing e-mails that make it look like they were send from legitimate services such as:

  • PayPal.
  • FedEx.
  • Newegg.
  • Skype.
  • AliBaba.
  • AliExpress.
  • UPS.
  • DHL.
  • Macys.
  • Apple.
  • Overstock.
  • Skrill.
  • CraigsList.
  • Wallmart.

Those e-mails usually have an e-mail attachment that may either be a JavaScript, HTML Microsoft Office and Adobe documents. The documents may infect when the user clicks on a “Enable Content” button which causes an infection with malicious macros.

X3M Cerber Decryptor Virus – Post-Infection Activity

After the user becomes infected, the infection malware may connect to the server of the cyber-criminals and download different types of executable modules in various Windows key directories, such as:

After the files are downloaded, the X3M Cerber Decryptor ransomware may modify the Run and RunOnce registry entries in Windows to set the location of the malicious file that encrypts data. It will also make sure to modify the registry value of the Wallpaper.

To encrypt files, the X3M Cerber Decryptor threat uses an AES (Advanced Encryption Standard) cipher, which alters bits of those files’ code into symbols from the encryption cipher. After this, the virus may add one of the following file extensions – _x3m, _r9oj, _locked. The encrypted files may appear like the following:

After encryption, researcher at id-ransowmare.blogspot.bg reports that the virus changes the wallpaper with the following note to the victim, in order to make it’s presence known:

“ALL YOUR IMPORTANT FILES ARE ENCRYPTED
Your documents, photos, databases and other important files have been encrypted! To decrypt your files you need to buy the special software – «Cerber decryptor»
Data recovery requires decoder.
To obtain decryptor, please, contact me by email: [email protected]
The cost of the decoder: ~700 USD
Payment only Bitcoin.
Your personal identification ID: id-2650322560
______________________________________
ALL YOUR IMPORTANT FILES ARE ENCRYPTED
Your documents, photos, databases and other important files have been encrypted! To decrypt your files you need to buy the special software – «x3m decryptor»
To obtain decryptor, please, contact me by email: [email protected]
Your personal identification ID:”

There is also a backup e-mail used by one of the variants of this virus in the note and It is [email protected].

Remove X3M Cerber Decryptor Virus and Restore the Files

In conclusion this is a Cerber ransomware copycat, most likely a low-quality one. Nonetheless, in case you have been infected by this virus, there are numerous options for you to do, instead of choosing to pay 700 dollars to the crooks who made it.

First, malware researchers recommend removing X3M Cerber Decryptor immediately from your computer. This will create a safe environment if you want to try and restore the file. For the removal, we suggest to follow the instructions below. In case you lack experience in removing ransomware, experts also advise to use an advanced anti-malware program which will ensure automatic detection and removal of X3M.

After removing the malware, advices are to follow the instructions in step “2.Restore files encrypted by X3M” below. They include multiple methods to restore the files, some of which may damage them , if the virus has a CBC-mode enabled. This is why, we advise you to backup the encrypted files before begging to employ those tools.

Manually delete X3M from your computer

Note! Substantial notification about the X3M threat: Manual removal of X3M requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove X3M files and objects
2.Find malicious files created by X3M on your PC

Automatically remove X3M by downloading an advanced anti-malware program

1. Remove X3M with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by X3M
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.