Jump to content

Help! ID [email protected] .arena

Recommended Posts

I am very happy to find someone who is interested in helping!

My case is the following Ransomware was installed on an application server that was set up to serve another affiliate company with us believe it was for this reason ... This happened on the 2nd at 6 o'clock in the morning and lasted a few minutes, our computers are with Eset nod32 configured and then Ransomware was encrypting all the shared folders on our internal network, for some reason it stopped operating and the encryption was partial and also there are no more records of it on our server we do not even have the page they always display the victim.

Attached I sent 3 encrypted files and copies that I had of them without being encrypted, thank you from the heart. Thank you!

Contrato Portugal - Segmento e Rodes.doc.id-10E807F1.[[email protected]].arena

Modelo Instruções Envio Revistas1.doc

Modelo Instruções Envio Revistas1.doc.id-10E807F1.[[email protected]].arena


Acompanhamento.xlsx.id-10E807F1.[[email protected]].arena

Contrato Portugal - Segmento e Rodes.doc

Link to comment
Share on other sites

In theory it's a variant of the Crysis/Dharma ransomware:

I recommend checking with ID Ransomware to verify that (you can paste a link to the results here if you would like me to take a look at them):

In the case of ransomware like this, which uses secure encryption and generates new public/private keys for every computer it infects, usually there is no way to decrypt the files without getting the private key from the criminals who made the ransomware. You can try a tool such as ShadowExplorer, however ransomware like this usually deletes Volume Shadow Copies, so ShadowExplorer will usually find nothing. Even if the Volume Shadow Copies were not deleted, the odds of finding backup copies of files in them is pretty slim, since Windows would normally only leave backup copies of files in the Volume Shadow Copies if you were using Microsoft's own backup software for data backups (although sometimes the System Restore will save copies of files in the Volume Shadow Copies).

In cases where the Volume Shadow Copies are deleted, then note that ransomware doesn't generally delete them securely, so it might be possible to use a file undelete utility to undelete the old Volume Shadow Copies, and then use ShadowExplorer to recover files, however this isn't necessarily straightforward to do (the computer will need to be running from a bootable disk to have write access to the "System Volume Information" folder, or the hard drive will need to be connected to another computer), and even if you can recover the old Volume Shadow Copies, as mentioned above the odds of there being backup copies of important files in them are low to begin with. Note that you may need to find a local computer technician who can assist you with this if you do want to try it.

Here's a link to a list of file recovery tools at Wikipedia:

Link to comment
Share on other sites

This topic is now closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...