Jump to content

Recommended Posts

Posted (edited)

f463c19a620800a300c8f03515a8f714.png

 

A new ransomware has started to become seen on various computer support forums that encrypts your data and then appends the helpmeATfreespeechmail.org string to the filename.

We believe this infection is part of a ransomware engine that different affiliates utilize, but with their own payment email addresses.

When a computer becomes infected by this family of malware, the victim will be assigned a unique ID.

This ID and the associated ransom email address will then be appended to any files that are encrypted. For example, if an infected user received an ID of 4126721512 and a file called baseball.jpg is encrypted, the filename would become baseball.jpg.id-4126721512_helpmeATfreespeechmail.org.

This infection also changes the Windows wallpaper to an image, as shown above, that contains instructions on how to pay for the decrypter. Thankfully, Kaspersky Lab has a utility called RakhniDecryptor that is able to brute force the decryption key for the helpmeATfreespeechmail.org ransomware and other variants.

 

To use RakhniDecryptor, you must first download it directly from Kaspersky's site.

Though there may be other sites hosting this tool, it is strongly suggested that you only download it only from Kaspersky as they are routinely updating it for new members of this ransomware family.

Once you have downloaded RakhniDecryptor, you should double-click on the rakhnidecryptor.exe filename to start the program.

When the program starts you will be shown the start screen as seen below.

 

8f6824da6f8f601e2a0ecbe932fbfe75.jpg

 

If you need to scan Network drives that may have encrypted files, you can click on the Change Parameters option and put a checkmark in Network Drives.

When in these settings, you should not put a checkmark in the Delete crypted files after decryption button unless you are 100% sure that the tool can properly decrypt your files.

 

10d2fcc40769fc337eb28e60f48ecf34.jpg

 

When you have finished, you can press the OK button and then click the Start Scan button.

You will then be prompted to select an encrypted file.

As the program has not been 100% fully updated to support the helpmeATfreespeechmail.org variant, you need to enter *.* in the file name field and then press enter on your keyboard.

This will then force RakhniDecryptor to show any file type, including the freespeechmail.org encrypted files.

Once you select an encrypted file, you will receive a warning that the brute force process can take many hours if not days.

Press OK on this warning and the program will begin to brute force the password.

If it is successful it will then scan the rest of your drives for related files and decrypt them as well.

When it has finished, it will display a report showing how many files have been decrypted.

 

RakhniDecryptor is able to decrypt files that have been encrypted and renamed to the following filenames:

 

<filename>.<original_extension>.<locked>

<filename>.<original_extension>.<kraken>

<filename>.<original_extension>.<darkness>

<filename>.<original_extension>.<nochance>

<filename>.<original_extension>.<oshit>

<filename>.<original_extension>.<oplata@qq_com>

<filename>.<original_extension>.<relock@qq_com>

<filename>.<original_extension>.<crypto>

<filename>.<original_extension>.<helpdecrypt@ukr.net>

<filename>.<original_extension>.<pizda@qq_com>

<filename>.<original_extension>.<dyatel@qq_com>

<filename>.<original_extension>_crypt

<filename>.<original_extension>.<nalog@qq_com>

<filename>.<original_extension>.<chifrator@qq_com>

<filename>.<original_extension>.<gruzin@qq_com>

<filename>.<original_extension>.<troyancoder@qq_com>

<filename>.<original_extension>.<encrypted>

<filename>.<original_extension>.<cry>

<filename>.<original_extension>.<AES256>

<filename>.<original_extension>.<enc>

<filename>.<original_extension>.<coderksu@gmail_com_id371>

<filename>.<original_extension>.<coderksu@gmail_com_id372>

<filename>.<original_extension>.<coderksu@gmail_com_id374>

<filename>.<original_extension>.<coderksu@gmail_com_id375>

<filename>.<original_extension>.<coderksu@gmail_com_id376>

<filename>.<original_extension>.<coderksu@gmail_com_id392>

<filename>.<original_extension>.<coderksu@gmail_com_id357>

<filename>.<original_extension>.<coderksu@gmail_com_id356>

<filename>.<original_extension>.<coderksu@gmail_com_id358>

<filename>.<original_extension>.<coderksu@gmail_com_id359>

<filename>.<original_extension>.<coderksu@gmail_com_id360>

<filename>.<original_extension>.<coderksu@gmail_com_id20>

<filename>.crypt@india.com.random_characters>

<filename>.<original_extension>.<hb15>

<filename>.<original_extension>.id-<id>_helpme@freespeechmail.org.

 

If your files become encrypted by any of the above ransomware variants, please do not pay the ransom. Instead you should try this tool first as you may be able to recover your files for free. As always if you need any help with this tool, do not hesitate to ask.

 

 

Source and Credit:

http://www.bleepingcomputer.com/news/security/new-helpme-freespeechmail-org-ransomware-can-be-decrypted-for-free/

[Lawrence Abrams]

 

 

Note:

Email links have been killed for safety reasons.

Edited by starbuck
76c90dd0e79a714317a8daeecc1584d2.png

  • FPCH Admin
Posted

Another one, huh? Here we go again.

Kaspersky seems to have come out with a tool quickly.

 

Thanks, Pete.

~I know that you believe you understand what you think I said, but I'm not sure you realize that what you heard is not what I meant.~

~~Robert McCloskey~~

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...