Skip to content

mlwre/DecryptCrypren

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DecryptCrypren

File decryption for those affected by the Crypren Ransomware.

PE Hash

Name Hash
MD5 f6a8d7a4291c55020101d046371a8bda
SHA1 09b08e04ee85b26ba5297cf3156653909671da90
SHA256 082060e3320870d1d576083e0ee65c06a1104913ae866137f8ca45891c059a76

Yara Rule

rule Ransom : Crypren{
	meta:
		weight = 1
		Author = "@pekeinfo"
		reference = ""
	strings: 
		$a = "won't be able to recover your files anymore.</p>"
		$b = {6A 03 68 ?? ?? ?? ?? B9 74 F1 AE 00 E8 ?? ?? ?? ?? E8 ?? ?? ?? ?? 68 98 3A 00 00 FF D6 6A 00 68 ?? ?? ?? ?? 68 ?? ?? ?? ??}
		$c = "Please restart your computer and wait for instructions for decrypting your files"
	condition:
		any of them
}

How To Get the Key

The key is an array of 64 ASCII printable chars matching the next conditions:

  • The first 32 bytes are alphabetic ASCII chars
  • The second 32 bytes are any possible ASCII char

As a key example: lHMtMQHegfRomgQvLDpBVjNYpcTaIXKJ!3+8,$@*5?;.+3#+@@232.$#024085.6 .

Decrypting DOCX files

Open a Microsoft WORD .docx file and locate the header section. Given this Ransomware uses a simple shift cipher the key may be easily revealed in those encrypted data blocks which happened to be originally zero.

Therefore, you may identify your key as a pattern of 64 bytes repeating across the file header as shown below:

![Extraccion Key](https://github.com/mlwre/DecryptCrypren/blob/master/src/HowToExtracKey.png?raw=true"Extract key")

Decryption Program

At the moment, the shared code decrypts the content for only one file, but the author is working on a version to support multiple files.

Compilation

gcc Solution.c -o Decrypt

Execution

Usage: ./Decrypt <filekey.txt> <file.Encrypted>

Decryption Example

lab@lab-Infeccion:~/Documentos/DecryptCrypren$ ./Decrypt ransom/key.txt ransom/photo_2016-05-12_14-01-27.jpg.ENCRYPTED 
 File Key:ransom/key.txt	File encrypted:ransom/photo_2016-05-12_14-01-27.jpg.ENCRYPTED
 key is:lHMtMQHegfRomgQvLDpBVjNYpcTaIXKJ!3+8,$@*5?;.+3#+@@232.$#024085.6�Y��P�
 -------------------------------------------------
 ransom/photo_2016-05-12_14-01-27.jpg.ENCRYPTED.decrypt

Example

About

Decrypt Files Affected for Crypren Ransom

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages