November 04, 2016
RotorCrypt Ransomware – Delivery
The RotorCrypt ransomware could be delivered to your computer using different ways. Its payload file could be spread with spam email campaigns. With these emails, the file could be attached and made to look as important. The entirety of the email may look legitimate and try to trick you that you need to open the attachment because its full contents cannot be conveyed in the email body. However, if you open that file, your computer becomes infected. The file can be heavily obfuscated and is in most cases an executable.
From the analysis report shown above, you can view that on the VirusTotal site, the file is named Trojan-Ransom.Win32.Rotor.b as some of the detections. The developers of this ransomware could be delivering the file with targeted attacks or through sharing services and social media. Do not be opening executables from suspicious emails, especially if they are of unknown origins. Scan these files with a security tool and check their signatures and size, beforehand. You should take a look at the ransomware prevention tips in our forum topic.
RotorCrypt Ransomware – Description
RotorCrypt ransomware is discovered to be a new variant of the Rotor Virus (cocoslim98). Now, it uses new executables to spread its malicious files. You can view in the Payload Security platform, the detection of one such executable file is called GWWABPFL.exe:
When the payload file of the RotorCrypt virus is executed on a computer, it spawns lots of processes, according to the malware researchers of Payload Security. The virus is still mainly orientated around targeting servers, although many Windows machines have been infected, too.
When RotorCrypt is active, it could set up values in the Windows Registry, whereupon it gains persistence. The values are set inside entries of that registry and make the ransomware launch automatically with every boot of the Windows operating system. Afterward, files get encrypted, and a tiny note with the payment instructions is created. You can view that ransom note in the screenshot right here:
The RotorCrypt ransomware does not give you any specific deadline for paying the criminals for the data decryption process. It also makes the offer of free decryption for a couple of files as a testing procedure. Nonetheless, its demands are high with the ransom amount which is demanded and that the decryption of some files will be only available after payment. The ransom price that is asked is 7 Bitcoins, and that amounts to over 4400 US dollars.
You shouldn’t think of paying these extortionists, as no one can guarantee that you will return your files to what they were after payment. The cybercriminals will probably use the money to make other ransomware or do more criminal acts. You should try to decrypt as many files as possible using the test decryption service that is provided and wait to see if there is a solution available.
A full list of extensions that are encrypted by this ransomware virus is not available yet, but the following file types are reported to be encrypted by RotorCrypt ransomware:
The RotorCrypt ransomware is very likely to delete the Shadow Volume Copies of the Windows Operating System with the following command:
Continue reading to check in what ways you could try to restore some of your data. Kaspersky may have a possible solution in the form of a decryptor tool.
Remove RotorCrypt and Restore .c400 Files
If your computer got infected with the Rotor ransomware virus, you should have some experience in removing malware. You should get rid of this ransomware as fast as possible before it can have the chance to spread further and infect more computers. You should remove the ransomware and follow the step-by-step instructions guide given below. To see ways that you can try to recover your data, see the step titled 2. Restore files encrypted by RotorCrypt.
Manually delete RotorCrypt from your computer