Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

New PClock CryptoLocker Ransomware discovered


  • Please log in to reply
1150 replies to this topic

#31 Kelz Clive

Kelz Clive

  •  Avatar image
  • Members
  • 17 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United States
  • Local time:08:18 AM

Posted 06 January 2015 - 09:56 PM

I have an interesting one here. I have a customer's computer and it has been encrypted by CTB-Locker. It has changed all the file extensions to ".dxgqqxc". I haven't seen this one before. I will check tomorrow on any replies.
 
Thanks in advance.



BC AdBot (Login to Remove)

 


#32 juanrra

juanrra

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:02:18 PM

Posted 07 January 2015 - 07:05 AM

PClock VB6 Cryptolocker Patcher

 

vbcl.png

 

Link: http://download.bleepingcomputer.com/Nathan/CryptolockerVB6_Patcher.exe

 

This patcher was made to help victims of PClock Cryptolocker (VB6 CryptoLocker) get their files back. This patcher works with both versions of the infection. As Fabian said above, this patcher will only work if you still have the infection present and running on the machine. If you no longer have the infection on the machine you can download it again from the URL below:

Hxxp://invisioncorp.com.au/scripts/wl/cl.exe

(THIS LINK DOES CONTAIN A INFECTION! DO NOT DOWNLOAD UNLESS YOU HAVE ALREADY BEEN INFECTED BY THIS INFECTION AND HAVE REMOVED IT!)

If you do not want to deal with downloading an infection and you have accidentally removed your infection, you can wait for Fabian to come out with a Decrypter for the new version.

 

If you have ran Fabians decrypter, you will need to not only install the infection again, but also rename all backed up encrypted files back to their original name before running my patcher.

 

If you are a victim that just got this infection and it is still on your machine and you have no tried Fabians decrypter, you may ignore all the above comments.

 

Instructions:

 

1.) Make sure the infection is running and you can see the main screen of the infection (Says 'Your Personal Files Have Been Encrypted').

2.) Download the patcher and place it on your desktop or similar location, and run the application.

3.) You will see a application that looks like the image above, simply click on "Patch!" to begin. (If you get errors at this step ensure the infection is running, and you have correct permissions.)

4.) A Messagebox will prompt and tell you to wait 5-10 minutes so the patch can work. Make sure to NOT close the application after this. Do not close the application until all files are decrypted.

5.) After a few minutes the virus screen will turn into a Decrypt Screen. Click the Decrypt button and all your files will be decrypted.

6.) Click "Finish!" and enjoy your files.

 

 

REMEMBER!

This infections code is very unstable and armature, and sometimes it can put files in the list of encrypted files that are NOT encrypted. This means when the decryption process is ran, it can corrupt files that aren't encrypted. So before decryption you should try and check the list and make sure there aren't files that are ok on the list. Sometimes this is not possible with the volume of files encrypted and that is understandable, this is simply a warning.

 

Enjoy. 

 

 

The link to download the virus CL.exe does not work! any other way of getting the virus? My antivirus erased it!   :(



#33 pepalberto

pepalberto

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Peru
  • Local time:08:18 AM

Posted 07 January 2015 - 10:00 AM

Hello, i have the new variant, that encrypt mp3. I used the decrypt_pclock, in my laptop i have few space so i didn't use a backup  option in the decrypter. The message finally says "successfull decrypted" but when i tried to open a file, it didn't open.

My antivirus erased the CL.exe

I tried to download the virus CL.exe does not work.

I'm waiting a new decrypter that fix my "decrypted" files.

Thank you for your inconditional work, sorry my english.



#34 Comdark.Bubnix

Comdark.Bubnix

  •  Avatar image
  • Members
  • 56 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Indonesia
  • Local time:08:18 PM

Posted 07 January 2015 - 10:03 AM

today,3 victims reported to me that their pc got hit with this virus. all of them got hit with second variant. one of them tried using nathan's tool and said that she had to wait too long (in step number 4. and she said nothing changed on her files). so i think i will tell them to wait for fabian's new decryptor tool for second variant. i really hope this new tool won't take months and wont have to run virus again,because all of them kind of affraid to run the virus again. still always thanks to nathan and fabian :thumbup2:



#35 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:09:18 AM

Posted 07 January 2015 - 10:19 AM

I just checked the patcher on the latest version and it still works fine. Ensure the infection is running when running the patcher. You do not need to download the infection if you already have it still on the machine. I suggest running the patcher first until the newer tool comes out. Also, if you need to download the infection remember you need to replace Hxxp with http or it wont download.


Have you performed a routine backup today?

#36 evanb

evanb

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:18 PM

Posted 07 January 2015 - 10:21 AM

Hello Nathan and Fabian,

 

Well the cryptolocker did a fantastic work on my pc.  Over 45,000 files were destroyed (close to 45gb)! 

I tried the initial fix (no luck), so I restored all .decbak to originals, but cannot d/l the cl.exe (not found) to see if the second fix will work.

 

Waiting for your new tool and hopefully can recover some of my (recent) files back.  Thanks in advance for your work.

 

Evan (from Greece)



#37 pepalberto

pepalberto

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Peru
  • Local time:08:18 AM

Posted 07 January 2015 - 10:25 AM

I just checked the patcher on the latest version and it still works fine. Ensure the infection is running when running the patcher. You do not need to download the infection if you already have it still on the machine. I suggest running the patcher first until the newer tool comes out. Also, if you need to download the infection remember you need to replace Hxxp with http or it wont download.

Hi Nathan, i replaced hxxp with http, the page says: "404 not found".

Thank you for your work.



#38 Fabian Wosar

Fabian Wosar

    Authorized Emsisoft Representative


  •  Avatar image
  • Security Developer
  • 744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:18 PM

Posted 07 January 2015 - 10:27 AM

Also, if you need to download the infection remember you need to replace Hxxp with http or it wont download.

The owner of the hacked server that the malware author used cleaned his server. So the malware files are no longer available for download at that location.
Best regards,

Fabian Wosar [Development]
Emsisoft Team - www.emsisoft.com

#39 royalflush

royalflush

  •  Avatar image
  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:18 AM

Posted 07 January 2015 - 10:30 AM

Hi Nathan, Fabian & team,

The patch works well, I have recovered/decrypted most of my important photos, videos etc.

 

As expected it didn't decrypt the files that I had previously attempted to decrypt using the original decrypter from Fabian, I'll will get onto the process of re-infecting the files tommorrow and post back the results.

 

You gave us confidence in recovering our files and promptly provided us the solution. Your work is appreciated! thank-you



#40 Nathan

Nathan

    DecrypterFixer


  •  Avatar image
  • Security Colleague
  • 1,617 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:09:18 AM

Posted 07 January 2015 - 10:31 AM

sorry, didn't realize I was on a cached page. The only way for the moment until the next tool is out is to restore the infection from a Av quarantine if possible.


Have you performed a routine backup today?

#41 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,113 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:09:18 AM

Posted 07 January 2015 - 10:59 AM

I have an interesting one here. I have a customer's computer and it has been encrypted by CTB-Locker. It has changed all the file extensions to ".dxgqqxc". I haven't seen this one before. I will check tomorrow on any replies.
 
Thanks in advance.


CTB-Locker now uses random extension. Still no way to decrypt unfortunately.

#42 Kelz Clive

Kelz Clive

  •  Avatar image
  • Members
  • 17 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:United States
  • Local time:08:18 AM

Posted 07 January 2015 - 02:24 PM

I have an interesting one here. I have a customer's computer and it has been encrypted by CTB-Locker. It has changed all the file extensions to ".dxgqqxc". I haven't seen this one before. I will check tomorrow on any replies.
 
Thanks in advance.


CTB-Locker now uses random extension. Still no way to decrypt unfortunately.

Thanks for the update Grinler.

#43 WernSwan

WernSwan

  •  Avatar image
  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:18 PM

Posted 08 January 2015 - 01:53 AM

I have this malware running (latest version).  When downloading the patcher emsisoft identifies it as malware.  Should that be the case?



#44 shroomiin

shroomiin

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:08:18 AM

Posted 08 January 2015 - 02:01 AM

Can anybody please provide the NEW version of WinCL.exe?

It's been removed from the hacked server at this location: http://invisioncorp.com.au/scripts/

I need to re-infect myself but can't seem to find the file after removing it initially.



#45 kazmier

kazmier

  •  Avatar image
  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:03:18 PM

Posted 08 January 2015 - 02:09 AM

Is there any update on Emsisoft Decrypter?






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users