Demonslay335

Visiting Expert
  • Content Count

    129
  • Joined

  • Last visited

  • Days Won

    9

Demonslay335 last won the day on February 3

Demonslay335 had the most liked content!

Community Reputation

25 Excellent

About Demonslay335

  • Rank
    Forum Regular
  • Birthday 12/12/1991

Contact Methods

  • Website URL
    https://id-ransomware.malwarehunterteam.com

Profile Information

  • Gender
    Male
  • Location
    USA
  • Interests
    Cats, coding, ransomware.

Recent Profile Visitors

5515 profile views
  1. @jaffar Thank you, I was able to confirm the key works for your files with that ID. I have added it to the server for the .rote extension. You may simply re-run the decryptor, and it should be able to decrypt some of your files now.
  2. 239/5000
     
     
     
    Hello friend, the group administrator tells me that you could decrypt the ransomware with extension .covm, could you help me? I have already run the decryptor but it has not worked for me. Follow the same message, impossible to decrypt, I appreciate your help.
  3. No. Dharma is not decryptable without the private RSA key only the criminals possess. Restore from backups and stop exposing RDP to the web.
  4. They are the exact same malware, just different names; the only thing that changed was the extension. The reason we are able to decrypt MegaLocker at all is because we acquired keys from the criminal's servers. Period. They then changed servers and locked it down better, and continued attacking victims. We do not have keys for victims encrypted after that date, as only the criminals have those keys. The crypto itself is otherwise secure and cannot be broken any other way without the keys.
  5. As the FAQ and all you've read will already tell you, there is nothing we can do. It is impossible to decrypt, as only the criminals have your private RSA key that is unique to your files. Period. This ransomware is exclusively spread via pirated programs, so...
  6. The encrypted files themselves are not infectious or anything. It's always recommended to archive encrypted files in that case in hopes of something changing in the future; unfortunately with STOP Djvu and the new variants with online keys, your only chance will be if the criminals are caught and their private RSA keys seized by law enforcement.
  7. No. If your files were encrypted by an online key, then only the criminals have your key.
  8. @abdi Read the FAQ... it is impossible to decrypt. Period.
  9. The files that were decrypted would have been encrypted by the offline ID... as explained in the FAQ, the malware sometimes encrypts some files with an online key, and others with an offline key. Those 3 files just got lucky. The decryptor would not show the ID if it decrypted them; only if it could not decrypt the files.
  10. Are you sure the file pair you are providing is good? It has to be the exact same file before and after the encryption. Any modifications between that and when it was encrypted would result in a bad pair. You can zip the files together and post them here if the forum allows (use a third-party sharing site if it doesn't), and I can take a look.
  11. We will need the malware executable that encrypted the files in order to update our decryptor.
  12. TXT files will not be possible with this method. The keystream generation depends on the first 5 bytes of the file - TXT files do not have a "standard", and thus will likely never have the same 5 bytes. Unless every single TXT file you have started with the same first word or two by chance...
  13. Some extensions they re-use the same offline ID and corresponding key. In this case, .bboo, .ooss, and .mool all have the same offline ID.