Hello everybody!
We had have encrypt files while totally offline ... which under our understanding means key is within the binary file and we have retrieved some probably private keys... Which we will use with a decryptor sent by some fellow who paid ransom bitcoins...
I will post my results as soon as we test everything.
I believe recursive engineering is the right path but could take long time!!!
CTB-Locker has only been reported to be infecting devices either via drive-by download or e-mail with malicious attachment. Meaning you'd need to be connected to the Internet to get infected, at least at some point. After it executes, if your files have been manipulated, then the key exchange already took place and is likely stored in memory within the process it injects itself into anyway.
Although, launching certain ransomware variants offline and noticing an infection whether or not it is believed to require communication with its C&C server to exchange the private key isn't necessarily odd. Most variants (utilizing asymmetric encryption [RSA-2048 for example]) will utilize the public keys for encrypting the data within the files, and transmit the private key to the remote server. I doubt that a sophisticated variant of malware such as the latest version of CTB-Locker stores private keys within a binary file on the local device, let alone any files on the infected file system. That's highly unlikely; rather, receiving the private key is more likely (which is not saying much due to the extremely tedious nature of the work required to even attempt this) through live analysis beginning prior to the initial launch, while monitoring and dumping memory from processes that it spawns [and injects itself into].
It's also not unreasonable to believe that some ransomware variants that leverage symmetric encryption algorithms will encrypt the data within the files with the symmetric algorithm (e.g. AES-256) for speed purposes, while actually encrypting the symmetric key itself with utilizing an asymmetric algorithm to prevent its retrieval. Then sending the private key to the remote server while never storing it on the file system, but rather in memory, which we know is quite volatile.
I feel that if you're infected while offline that the private key will either be lost due to the fragile nature of memory, or the lack of an Internet connection would prevent it from being stored on the remote server, meaning that it's completely lost and you're pretty much out of luck.
How do you think you got infected? Are you even positive that you were infected with CTB-Locker rather than some other malware or type of ransomware?