Threat Database Ransomware Encrpt Ransomware

Encrpt Ransomware

A powerful ransomware threat named the Encrpt Ransomware has been detected by cybersecurity experts. Although this particular malware is classified as a variant from the VoidCrypt Ransomware family, its potential to cause damage remains significant.

Indeed, if Encrpt is deployed on a targeted computer successfully, it will render almost all of the files stored there unusable. The threat does so via a strong cryptographic algorithm. Each locked file will have its name modified to a significant degree. Encrypt will first append a string of random characters that may be acting as an ID for the specific victim, followed by an email address controlled by the attackers, and finally, '.encrpt' will be added as a new file extension.

Ransom Note's Details

When the Encrpt Ransomware has finished locking all targeted file types, it will drop two identical ransom notes on the breached device. One will be delivered as a simple text file named 'Decryption-Guide.txt,' while the other will be displayed in a pop-up window generated from a 'Decryption-Guide.hta' file.

According to the instructions, the first action taken by Encrpt's victims should be to locate a key file without which restoration of the encrypted data could prove to e impossible. This file should have been created by the threat in the C:/ProgramData folder and could be named 'RSAKEY.KEY.'

Alongside the key file, users are allowed to send one locked file to be decrypted for free. Although the note states that the hackers have two email addresses that can be used for communication - one main address and one that acts as a backup channel, it turns out that this is not the case. The email mentioned in both places is one and the same - 'Encrpt@criptext.com.'

Encrpt Ransomware's instructions are:

'Your Files Are Has Been Locked

Your Files Has Been Encrypted with cryptography Algorithm

If You Need Your Files And They are Important to You, Dont be shy Send Me an Email

Send Test File + The Key File on Your System (File Exist in C:/ProgramData example : RSAKEY-SE-24r6t523 pr RSAKEY.KEY) to Make Sure Your Files Can be Restored

Make an Agreement on Price with me and Pay

Get Decryption Tool + RSA Key AND Instruction For Decryption Process

Attention:

1- Do Not Rename or Modify The Files (You May loose That file)

2- Do Not Try To Use 3rd Party Apps or Recovery Tools ( if You want to do that make an copy from Files and try on them and Waste Your time )

3-Do not Reinstall Operation System(Windows) You may loose the key File and Loose Your Files

4-Do Not Always Trust to Middle mans and negotiators (some of them are good but some of them agree on 4000usd for example and Asked 10000usd From Client) this Was happened

Your Case ID :

OUR Email :Encrpt@criptext.com

in Case of no answer: Encrpt@criptext.com'

Trending

Most Viewed

Loading...