Demonslay335

Visiting Expert
  • Content Count

    62
  • Joined

  • Last visited

  • Days Won

    5

Demonslay335 last won the day on June 25

Demonslay335 had the most liked content!

Community Reputation

10 Good

About Demonslay335

  • Rank
    Active Member
  • Birthday 12/12/1991

Contact Methods

  • Website URL
    https://id-ransomware.malwarehunterteam.com

Profile Information

  • Gender
    Male
  • Location
    USA
  • Interests
    Cats, coding, ransomware.

Recent Profile Visitors

2424 profile views
  1. Yep, as I suspected. The files are corrupted. What's going on is the MP3 format is likely a little bit tolerant of some data loss. GlobeImposter 2.0 does not encrypt the whole file, only like the first few MB I believe. If you were to simply remove the ".DOCM" extension from the file, you would get the exact same result. GetCrypt Ransomware uses a random 4-character uppercase extension, so that's the only reason the decrypter is fooled into "accepting" your file pair. Due to the way I am breaking that ransomware, the tool also cannot actually verify whether the decryption was successful, it just has to blindly throw the crypto at the file.
  2. Mind sharing some of these encrypted MP3s that are supposedly "decrypted"? I have an idea as to what is going on, and it's not actually decryption...
  3. If you can find a file "bginfo.png" on the system in the same folder as the executable, there might be a chance. Otherwise, so far it does not look like it can be decrypted without that file at the current time.
  4. We will really need the executable or commands used to encrypt the files in order to analyze it any more. By the way, the filepair you provided are not the same file before/after the encryption. The encrypted file's filename decodes to "rollup.png". It's just simple base64 encoding on the name.
  5. my files are encrypted ransomware hacker and convert all my file format to extension (.delle) please help me how my data decrypt (.delle)

    dentified by

    • ransomnote_email: [email protected]
    • sample_extension: .dalle
    • sample_bytes: [0x374DB - 0x374F5] 0x7B33364136393842392D443637432D344530372D424538322D3045433542313442344446357D
    Decrypted 115 files!
    Skipped 82224 files.
    [!] No keys were found for the following IDs:
    [*] ID: onoONoeRoRiIIL9NhEJ9kd4eugwAgOoMDxlonc5F (.dalle )
    Please archive these IDs and the following MAC addresses in case of future decryption:
    [*] MACs: 00:FF:47:9B:63:3F, 00:FF:FA:3C:1F:43, 60:6C:66:2D:C5:8F, 20:89:84:46:B8:3D, 00:50:56:C0:00:01, 00:50:56:C0:00:08
    This info has also been logged to STOPDecrypter-log.txt
     

    Decrypted 50 files!
    Skipped 26548 files.

    [!] No keys were found for the following IDs:
    [*] ID: onoONoeRoRiIIL9NhEJ9kd4eugwAgOoMDxlonc5F (.dalle )
    Please archive these IDs and the following MAC addresses in case of future decryption:
    [*] MACs: 00:FF:47:9B:63:3F, 00:FF:FA:3C:1F:43, 60:6C:66:2D:C5:8F, 20:89:84:46:B8:3D, 00:50:56:C0:00:01, 00:50:56:C0:00:08
    This info has also been logged to STOPDecrypter-log.txt
     
     
     

  6. plz help me to decrypt  my files

     IDs:
    [*] ID: OOqf5MmKYGhef0kpRGrshoRDoY4IKzSXCrQ5yCy7 (.stone )
    Please archive these IDs and the following MAC addresses in case of future decryption:
    [*] MACs: A6:17:31:7A:68:C3, A6:17:31:7A:60:C3, 6C:3B:E5:F6:EC:55, 00:FF:96:11:4B:BD, A4:17:31:7A:68:C3

  7. No, the malware would re-encrypt them...
  8. Do NOT do that. Your files will just get re-encrypted with the offline key, which STOPDecrypter already has. So it's just a complete waste of time and won't accomplish anything but possibly causing more damage to your system.
  9. The .pumax variant is 100% decryptable if you follow the instructions in the README.txt and provide it an encrypted file and its original. Don't bother with the ID and MAC, I don't need to archive those for that variant.
  10. If you can zip up everything they gave you and a few encrypted files and attach it here, we can see what we can do.
  11. Possibly in the future, just give us some time. 😉
  12. To second @GT500, have you heard of a little something called CVE-2019-0708? It's literally an exploit that doesn't require even logging in, completely bypassing MFA... it's not the first such exploit recently, nor will it likely be the last. Good that you have MFA, but seriously put it behind VPN.
  13. It's STOP Djvu Ransomware, please read the FAQ here: https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-tro-djvu-rumba-openmetxt-support-topic/ In addition, we still need the malware executable for this extension. Please check Task Scheduler for a suspicious task running every 5 minutes, and disable it. Go to Properties, and find the executable it is pointing to, upload it to VirusTotal, and post a link here.
  14. Please follow the instructions in the link ID Ransomware gave you to provide the information needed to archive your case. In addition, we still need the malware executable itself. Check your Task Scheduler for a suspicious task running every 5 minutes or so - go to Properties and find the executable it points to, and upload it to VirusTotal, then provide us the link.
  15. This is STOP Djvu Ransomware, and we need a sample of the malware. Can you check Task Scheduler for a suspicious task running very often (like every 5 minutes)? If you find it, please disable it, then go to Properties for it, Actions tab, and select the "Start a program" - click Edit, and note the location the executable is. Find that executable and upload it to VirusTotal, then send me a link to it. If you need further help with this, I will have a support team member reach out to you for more guided assistance. I do need that malware sample ASAP. In addition to securing the malware executable, please follow the directions in this article to provide me the Personal ID and MAC addresses of the infected machine. https://kb.gt500.org/stopdecrypter