December 02, 2016

Unlock your ransomed files using Avast’s Ransomware Decryptors
RansomwareDecryptorToolsWithin the last year, ransomware has risen to become the new “it” malware – we have seen a 105% year over year growth in ransomware attacks. Therefore, we are happy to announce today, that we have released four more ransomware decryption tools for the latest ransomware threats: Alcatraz Locker, CrySiS, Globe, and NoobCrypt. All the decryption tools are available, together with a detailed description of each ransomware strain. We now have tools to help you recover encrypted files if your computer has been infected with one of the following ransomware strains:

  • Alcatraz Locker
  • Apocalypse
  • BadBlock
  • Bart
  • Crypt888
  • CrySiS
  • Globe
  • Legion
  • NoobCrypt
  • SZFLocker
  • TeslaCrypt

All of these tools are free and, if possible, are updated as these strains evolve.

Since we’ve released the first batch of seven decryption tools, we’ve received many messages from ransomware victims thanking us and telling us that these tools saved their digital lives and/or businesses. We hope the four new decryption tools will help more innocent people affected by these ransomware strains.

Here is a brief description of the four new ransomware strains we now offer decryption tools for:

Alcatraz Locker
Alcatraz Locker is a ransomware strain that was first seen in the middle of November 2016. Files encrypted by Alcatraz Locker have the extension name ".Alcatraz". After encrypting files, a messag

Unlike most other ransomware strains, Alcatraz does not have a list of file extensions that it is interested in. Simply said, the ransomware encrypts whatever it can find and is open for write access. To prevent damage to the operating system (and possibly rendering it unbootable), Alcatraz Locker only encrypts files in the %PROFILES% directory (usually C:\Users).e appears (the message  is located in a file called "ransomed.html"on the infected computer’s desktop):


Alcatraz Locker encrypts files using Windows’ built-in cryptographic functions (Crypto-API):


The ransom message states that it uses AES-256 encryption with a 128-bit password. Malware analysis showed this to be false (the password is actually 128 bytes, not 128 bits). However, the malware uses 160-bit hash (SHA1) as an initial key for 256-bit AES encryption. In Crypto-API (used by the ransomware), this is implemented with an interesting twist:

  1. Create 256-bit array, filled by the hexadecimal value 0x36
  2. XOR the first 160 bits of that array with the initial 160-bit SHA1 hash
  3. Calculate SHA1 of the XOR-ed array (call it Hash1)
  4. Create 256-bit array, filled by the hexadecimal value 0x5C
  5. XOR the first 160 bits of that array with the initial 160-bit SHA1 hash
  6. Calculate SHA1 of the XOR-ed array (call it Hash2)
  7. Combine (concatenate) 160 bits from the Hash1 and 96 bits from Hash2

The resulting, concatenated hash is used as the initial key for AES256.

After performing the AES-256 encryption, the ransomware also encodes the already-encrypted file with BASE64, which causes the encrypted file to have a typical pattern:
The ransomware states that the only way to get your data back is to pay 0.3283 Bitcoin (about $240 at the time of writing this article). However, if you use the Avast Decryption Tool for Alcatraz, you can get your files back for free :). The 30 day time limit, which is mentioned in the ransom message, is also a lie; you can decrypt your documents at any time, even after 30 days.


CrySiS (also known as JohnyCryptor or Virus-Encode) is a ransomware strain that has been around since September 2015. Its severity is based on the strong encryption (AES and RSA algorithms) it uses and the fact that rather than encrypting selected files, it contains a list of extensions that will not be encrypted.

Encrypted files follow a pattern of: <original-file-name>.id-<NUMBER>.<This email address is being protected from spambots. You need JavaScript enabled to view it.;.<extension>

While the ID-number and email change often, there are only three different extension names that we have seen being used so far:

.xtbl, .lock, and .CrySiS

As a result, encrypted file names can, for example, be:

Each encrypted file contains all the data required to decrypt itself. Files smaller than 262,144 bytes are encrypted fully and at the end there’s a structure containing an encrypted AES key along with other data, such as the original file name, which will allow for full decryption. It’s worth noting that files larger than 262,144 bytes are only partially encrypted, which still renders them unusable. This functionality also causes larger files to grow in size post encryption.

After encrypting the files, the ransomware displays a message as an image (see below) describing how the encrypted data can be retrieved. The message is also located in "Decryption instructions.txt", "Decryptions instructions.txt", or "README.txt" on the infected computer’s desktop.

Several examples of CrySiS ransom messages:



Globe is a ransomware strain that has been been around since August 2016. It is written in Delphi and usually packed with UPX. Some of the variants are also packed with Nullsoft Installer:

  • bc4c0b2f6118d36f4d476db16dbd6bcc0e393f2ad08429d16efe51f3d2870d58
  • fdc8de22653ebcf4cb8f5495b103e04079b0270efa86f713715f0a81f1b2e9b0

In the unpacked binaries, there is a global “configuration” structure, where the ransomware author can modify some of the features:

  • Target name of the executable in %APPDATA% folder
  • The extension of the encrypted files
  • List of file types (extensions) to encrypt
  • The ransom message in HTML format
  • Whether the ransomware should encrypt file names or not
  • Whether the ransomware should check for sandboxes (VirtualBox, VirtualPC, Vmware, Anubis)
  • Whether the malware should auto-start or not
  • Whether the malware should delete restore points
  • … and more.

Because distributors can modify the ransom, we have seen many different variants creating encrypted files with various extensions.

Interestingly enough, the ransomware has a built-in debug mode, which can be enabled by the following registry setting:

When enabled, the ransomware will ask about each particular step:















Based on sample, the ransomware encrypts files either with RC4 or BlowFish encryption. When the ransomware is configured to encrypt file names, it does so with the same encryption like the file data, and the encrypted name is then encoded with an own implementation of Base64 encoding.

Few examples of created extensions that can be decrypted using Avast Decryption Tool:

This email address is being protected from spambots. You need JavaScript enabled to view it.
This email address is being protected from spambots. You need JavaScript enabled to view it.

Typically, the ransomware creates a file named “Read Me Please.hta” or “How to restore files.hta”, which is displayed after the user logs in:


Do not pay! Use our Globe Decryption Tool instead.


I discovered this strain back in July 2016. It is a project created in C# and utilizing the AES256 encryption algorithm. It also has an expressive graphical interface, which appears once the victim files are encrypted.


This screen with the extortion information is an odd mixture of messages. For example, it requests payments to be made in a certain amount of New Zealand Dollars (NZD), but requests the payment be made to a Bitcoin address, while at the same time it proudly claims to be “Made in Romania”. An odd combination, if you ask me.

The name NoobCrypt has been chosen based on messages found it its code:


The code quality is quite poor, but its author compensates this lack of quality by using strong words, such as calling victims Noobs (i.e. newbies).

NoobCrypt provides an “unlock code” to decrypt the files, which has to be purchased. I already posted free unlock codes for all known NoobCrypt versions on Twitter (e.g. 1, 2, 3), but it was up to the affected person to distinguish, which of them had to be used. However, with our decryption tool you no longer need to figure out which code needs to be used.

Shortly after this defeat, a malware researcher called xXToffeeXx notified us about the discovery of a new NoobCrypt version advertised on multiple darknet markets. This version is on a sale for $300.
The author even prepared a demonstration video with features he or she claims are new, such as the usage of “Military Grade Encryption” or being “undetectable by any AV (except of AVG)” (which is not true… many AVs detect this).

19                                                    (Source: xXToffeeXx)

As you can see from the following screenshot, the author even used my name on a screen with ransom instructions and thanked me for something. Probably for giving a proper name for this piece of low quality code (this name is now being officially used).


Today, we present a NoobCrypt decryption tool for all known NoobCrypt versions. The decryption process is now much easier than finding a proper unlock code and you no longer need to depend on the decryption code from NoobCrypt (you shouldn’t trust ransomware to decrypt your files, right?).

Description of NoobCrypt and our decryption tool.

How to protect yourself from falling victim to ransomware

First and foremost, make sure you have antivirus, like Avast, installed on all of your devices (even smartphones can become infected with ransomware). Antivirus will act like a safety and block ransomware before it can cause any damage, in case you accidentally try to download malware.
avast ransomwareThe next thing you can do to protect yourself is to be smart and alert. Ransomware distributors often use social engineering tactics to trick people into downloading the ransomware. Be careful which links and attachments you open and what you download on the web. Make sure you verify the source of emails including links and attachments and only download software and visit trusted sites.

Backing up your data properly on a regular basis is also crucial. Be sure to not keep your backups connected to your devices all the time, otherwise, your backups could be held ransom as well.

If you are unlucky and do become infected with ransomware, make sure to check out our decryptor tools to see if we can help you get your files back!

Special thanks

I would like to thank my colleagues Ladislav Zezula and Piotr Szczepanski for preparing the decryptors and to Jaromír Hořejší for his analysis of the Alcatraz Locker.


Alcatraz Locker





























News Courtesy :