Jump to content

Faraz

Members
  • Posts

    2
  • Joined

  • Last visited

Posts posted by Faraz

  1. Hi Marcos,

    already tried this. it is unable to recover. you can see the attached giving error.

     

    16 hours ago, Marcos said:

    It was likely an older Filecoder.Crysis that encrypted the files. That said, you probably either don't have ESET configured properly (e.g. some users inadvertently exclude typical malware locations from scanning), or an attacker managed to guess or bruteforce a U/P, remoted in, disabled ESET and then ran the ransomware.

    This decoder should work for ".wallet" files: https://support.eset.com/kb6274/

     

    Untitled.png

  2. Hi,

    i have been using NOD32 antivirus with updated virus signature but still our systems were affected.

    all the files are showing .wallet extensions. I have tried eset's decryptor but it doesn't help as it is showing below error in logs.

    [2017.12.24 14:56:11.953] - INFO: Cleaning file [E:\EAP\Guest_home_page.jpg.[6etc0in@cock.li]-id-2ABC.wallet]
    [2017.12.24 14:56:11.953] - INFO: Can't get header for file.
    [2017.12.24 14:56:11.953] - INFO: Can't get info from file.
    [2017.12.24 14:56:11.953] - ERROR: Not cleaned.

    Can anyone help me on this.

    Guest_home_page.jpg.[6etc0in@cock.li]-id-2ABC.rar

×
×
  • Create New...