CryptoWall

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by alyssa, Oct 5, 2015.

  1. alyssa

    alyssa Private E-2

    Reading some of the previous posts (notably that from KHudson) I understand that there is no fix for CryptoWall. Ours was evidently incorporated into a hacked email from a known vendor of ours and was opened on a computer which is hooked to our company network. It looks like the virus actually encrypted some of the files on the network but it stopped encrypting stuff after 11000+ files.

    Is there any way to inspect the registry to remove the active part of the virus or disable it to prevent it from becoming active again in the future?
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    See the ListCwall program mentioned in the below link from BleepingComputer

    http://www.bleepingcomputer.com/virus-removal/cryptowall-ransomware-information


    But as far as the active infection is concerned, have you actually removed it from the problem PCs? Have you checked that other PCs are not infected?
     
  3. alyssa

    alyssa Private E-2

    We have taken no action to actively remove the infection from the targeted computer or the in house server (if it actually went there as well). The infection actually occurred on 15 September and went undetected until yesterday (5 October). We had already passed the deadline for response although we never got the extortion screen.

    Apparently the virus encrypted only 11000 files and stopped there. I am sure that the virus is still on the computer and needs to be removed. Most of the antivirus and antimalware programs do not seem to detect this virus, from what I have read. The Microsoft website gives links to a removal tool from BleepingComputer but the post is dated in early 2014.

    There are plenty of references and links via google, but for all I know they may have been placed there by the very creatures that have developed the virus and are trying to infect other computers. That is why I went to the Microsoft website and also came to your site.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well if you want us to look for active components of the infection we can do that. I will give you are cleaning process below. But please understand that it will not restore any corrupted files and chosing not to format and reinstall could potentially be a problem since you are going to have lots of files on your computers that have been modified by the infection and thus risk reinfection. Also you could find that various programs will no longer even work properly.


    If you still want to work on cleaning up active aspects of the infectuon, please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual update Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only RogueKiller and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run the rest of the READ & RUN ME FIRST instructions on the infected account.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds