MaxiCrypt Ransomware-Threat In Detail
MaxiCrypt is a new file-encrypting ransomware threat that is out in the wild and is targeting English-speaking users. The ransomware uses AES encryption algorithm to lock the files and append “. [Maxicrypt@cock.li] .maxicrypt” extension to it. The extortionists demand to pay the ransom in Bitcoins and leaves a ransom note named as “How the restore to your data.txt”. The authors of MaxiCrypt ransomware asks user to contact via the provided email address email@example.com or
firstname.lastname@example.org. Security Experts doesn’t recommend you pay the fine. There is no guarantee that paying the ransom will give you access to your files. Remove MaxiCrypt immediately.
|Description||MaxiCrypt Ransomware encrypts files, videos, images and texts stored on the target PC and demand a ransom amount from users to decode the files.|
|Occurrence||spam mail attachments., exploit kits, malicious links and java script codes..|
|Possible Symptoms||The ransom note can be seen on desktop and other file directories and files could not be accessible.|
|Detection Tool||Download the Detection tool– To confirm attack of MaxiCrypt Ransomware virus on your computer.|
MaxiCrypt Ransomware is distributed through spam mail attachment as a malicious script containing the payloads of the malware which if executed by the user could install the threat onto the computer system. Many cyber-criminals uses spam techniques to trick users by heading the mail as any invoice or shipment. Other sources might include visiting infected websites containing java script codes, fake updates, exploit kits and spam bots. As you open the document or click the link, the payloads of MaxiCrypt Ransomware gets downloaded on the system and installed without any user’s permission. If the user open/execute this file on their device, then the virus gets installed and your PC will become infected with MaxiCrypt file-encrypting Ransomware threat.
More about MaxiCrypt Ransomware
MaxiCrypt Ransomware is a file-encrypting program that searches for important files on the victim’s PC like MS Office documents, OpenOffice, PDF, text files, databases, photos, music, video, image, archives and so on. And encrypts them using AES encryption algorithm and adds “. [Maxicrypt@cock.li] .maxicrypt” extension to the files. This renders them non-accessible to users. And further ask users to pay the ransom to get the decryption key and unlock the files.
The ransomware changes the windows Registry entries to launch each time the window’s starts and takes up huge system resources to encrypt the files. MaxiCrypt Ransomware drops a file named as “How the restore to your data.txt”.
The files contains the ransom note and instructions for users on how to contact the authors of the ransomware and get their files back.
The ransom Note says:
YOUR FILES ARE ENCRYPTED!
Your personal ID
Your documents, photos, databases, save games and other important data was encrypted.
Data recovery the necessary decryption tool. To get the decryption tool, should send an email to:
email@example.com or firstname.lastname@example.org
In a letter to include Your personal ID (see the beginning of this document).
In the proof we have decryption tool, you can send us 1 file for test decryption.
Next, you need to pay for the decryption tool.
In response letter You will receive the address of Bitcoin wallet which you need to perform the transfer of funds.
If You have no bitcoins
* Create a Bitcoin wallet: https://blockchain.info/ru/wallet/new
* Purchase Bitcoin: https://localbitcoins.com/ru/buy_bitcoins or http://www.coindesk.com/information/how-can-i-buy-bitcoins (Visa/MasterCard, etc.)
When money transfer is confirmed, You will receive the decrypter file for Your computer.
After starting the program-interpreter, all Your files will be restored.
* Do not attempt to remove a program or run the anti-virus tools
* Attempts to decrypt the files will lead to loss of Your data
* Decoders other users is incompatible with Your data, as each user unique encryption key
The ransom note by MaxiCrypt virus states that your documents has been encrypted and you need to pay a ransom in Bitcoins to get back your files. The ransom demands varies for the user and the victims should contact with the provided email address as soon as possible.
->email@example.com or firstname.lastname@example.org
List of file extension encrypted
→.txt, .doc, .docx, .xls, .xlsx, .pdf, .pps, .ppt, .pptx, .odt, .gif, .jpg, .png, .db, .csv, .sql, .mdb.sln.php, .asp, .aspx, .html, .xml, .psd, .frm, .myd, .myi, .dbf, .mp3, .mp4, .avi, .mov, .mpg, .rm, .wmv, .m4a, .mpa, .wav, .sav, .gam, .log, .ged, .msg, .myo, .tax, .ynab, .ifx, .ofx, .qfx, .qif, .qdf, .tax2013, .tax2014, .tax2015, .box, .ncf, .nsf, .ntf, .lwp, .crt, .csr, .flv, .key, .mdb, .mkv, .mpeg, .pem, .pptm, .sqlite3, .sqlitedb, .tif, .wma, .xlm, .xlsm, .xltm
MaxiCrypt Ransomware uses AES encryption algorithm to encrypt data and appends random extensions to it. The crypto-malware ensures that the user could be able to recover the files from shadow volume copies, so it deletes the files by executing the command
→vsMaxiCryptmin.exe delete shadows /all /Quiet