Demonslay335

Visiting Expert
  • Content Count

    129
  • Joined

  • Last visited

  • Days Won

    9

Everything posted by Demonslay335

  1. @jaffar Thank you, I was able to confirm the key works for your files with that ID. I have added it to the server for the .rote extension. You may simply re-run the decryptor, and it should be able to decrypt some of your files now.
  2. No. Dharma is not decryptable without the private RSA key only the criminals possess. Restore from backups and stop exposing RDP to the web.
  3. They are the exact same malware, just different names; the only thing that changed was the extension. The reason we are able to decrypt MegaLocker at all is because we acquired keys from the criminal's servers. Period. They then changed servers and locked it down better, and continued attacking victims. We do not have keys for victims encrypted after that date, as only the criminals have those keys. The crypto itself is otherwise secure and cannot be broken any other way without the keys.
  4. As the FAQ and all you've read will already tell you, there is nothing we can do. It is impossible to decrypt, as only the criminals have your private RSA key that is unique to your files. Period. This ransomware is exclusively spread via pirated programs, so...
  5. The encrypted files themselves are not infectious or anything. It's always recommended to archive encrypted files in that case in hopes of something changing in the future; unfortunately with STOP Djvu and the new variants with online keys, your only chance will be if the criminals are caught and their private RSA keys seized by law enforcement.
  6. No. If your files were encrypted by an online key, then only the criminals have your key.
  7. @abdi Read the FAQ... it is impossible to decrypt. Period.
  8. The files that were decrypted would have been encrypted by the offline ID... as explained in the FAQ, the malware sometimes encrypts some files with an online key, and others with an offline key. Those 3 files just got lucky. The decryptor would not show the ID if it decrypted them; only if it could not decrypt the files.
  9. Are you sure the file pair you are providing is good? It has to be the exact same file before and after the encryption. Any modifications between that and when it was encrypted would result in a bad pair. You can zip the files together and post them here if the forum allows (use a third-party sharing site if it doesn't), and I can take a look.
  10. We will need the malware executable that encrypted the files in order to update our decryptor.
  11. TXT files will not be possible with this method. The keystream generation depends on the first 5 bytes of the file - TXT files do not have a "standard", and thus will likely never have the same 5 bytes. Unless every single TXT file you have started with the same first word or two by chance...
  12. Some extensions they re-use the same offline ID and corresponding key. In this case, .bboo, .ooss, and .mool all have the same offline ID.
  13. That looks to be a good file pair. It may take a few days to a week to crack the password. I'll let you know.
  14. You can zip the files together and use any third-party sharing site such as WeTransfer, SendSpace, Dropbox, Google Drive, etc. Just paste the link here.
  15. Perfect. Confirmed that is the ransomware. Good news is we should be able to break it. It may take awhile though. Can you provide me with an encrypted file and it's original? Specifically an ".encryptedS" file please. Also, fun fact: the ransomware uses extension ".encryptedL" for files larger than 50,000,000 bytes, and extension ".encryptedS" for files smaller. Must stand for "Large" and "Small" respectively.
  16. You can simply upload it to VirusTotal and provide the link here.
  17. Keystream added to server. Should work for most of your other .mkv files. [+] ID: SinSPnFW89EGyfgIuac5Ym6CxpIkZ5ZjdYvgPcoV [+] Created keystream for files starting with: 1A45DFA3A3
  18. It may be something new, I've not seen a ransom note use that type of victim ID pattern before. We would need the malware executable in order to analyze any further.
  19. No... that's called a plaintext attack, and is not possible with New Djvu. Every file is encrypted with a unique (securely generated) Salsa20 key, which is then protected by RSA. Feel free to lookup the feasibility of breaking the Salsa20 algorithm (yes, the malware properly uses all 20 rounds) or RSA-2048.
  20. New Djvu, and that is an Online ID. Only the criminals have your key. Read the FAQ: STOP Djvu FAQ
  21. The file was encrypted by an online key. Impossible to decrypt.
  22. From what I can look up, the .ts extension seems to be part of the MPEG format; which does not have a standard set of bytes at the beginning past the first 0x47. There's nothing else we can do at the moment in that case, if you cannot find a good original file to match one of those encrypted files that is skipped. The decryptor will tell you what the first 5 bytes of the skipped file are.
  23. The decryptor and the FAQ already tell you; decryption is impossible because it is an online ID. Only the criminals have your key.