Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Loki Locker (BlackBit) Ransomware (.Loki, .BlackBit, .Rainman) Support Topic


  • Please log in to reply
38 replies to this topic

#1 ramuramisetty

ramuramisetty

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:15 AM

Posted 23 February 2022 - 05:23 AM

Any files that are encrypted with Loki Locker (Blackbit) Ransomware will have an [<email>][ID random 8 characters]<filename>.[extension] followed by the .Loki, .BlackBit, .Rainman, .PayForKey, .Adair, .Boresh, .onion700, .DATA extension appended to the end of the encrypted data filename as explained here by Amigo-A (Andrew Ivanov). These are some examples.

.[lolooki@protnmail.com][7E09E942]<filename>.mp4.Loki
.[spystar@onionmail.org][9ECFA84E]<filename>.jpg.BlackBit
.[bloc.boy@yandex.com][C279F237]<filename>.pdf.Rainman
.[Onion749@onionmail.org][52294877]<filename>.log.onion700
.[crypter@firemail.de][43DE62EH]<filename>.jpg.kill

Loki Locker typically will leave files (ransom notes) named Restore-My-Files.txt, info.hta, #FILES-ENCRYPTED.txt.

 

Some variants of Loki Locker are known to include a random 8 character System ID with a note about deleting specific files causing permanent data loss.

Your SYSTEM ID : 82F54321
!!!Deleting "Cpriv.Loki" causes permanent data loss.
Your SYSTEM ID : 8E4A83CF
!!!Deleting "Cpriv.BlackBit" causes permanent data loss.
Your System ID : 689DBE54
!!!Deleting "xor.689DBE54.kill" causes permanent data loss.

 
 
 
is there any solution for LOKI LOCKER ransomware?


Edited by quietman7, 21 November 2023 - 07:53 PM.
Moved from Intros to Ransomware - Hamluis.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 23 February 2022 - 08:18 AM

Unfortunately, there is no known method that I am aware of to decrypt files encrypted by Loki Locker (Blackbit) Ransomware without paying the ransom and obtaining the private encryption keys from the criminals who created the ransomware unless they are leaked or seized & released by authorities. Without the criminal's master private key that can be used to decrypt your files, decryption is impossible. That usually means the private key is unique (specific) for each victim and generated in a secure way (i.e. RSA, AES, Salsa20, ChaCha20, ECDH, ECC) that cannot be brute-forced...the public key alone that encrypted files is useless for decryption.

 
If feasible, your best option is to restore from backups, try file recovery software to recover (not decrypt) some of your original files or backup/save your encrypted data as is and wait for a possible solution at a later time.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#3 ramuramisetty

ramuramisetty
  • Topic Starter

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:15 AM

Posted 23 February 2022 - 08:40 AM

Thank you so much for your replay



#4 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 23 February 2022 - 09:49 AM

You're welcome.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#5 Rvn48

Rvn48

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:45 AM

Posted 23 May 2022 - 10:50 AM

Hello everyone.
My friend's server is a victim of Loki Locker.
Mb there is a solution for it already ?
Ive got copy of files (1 encrypted and 1 is not) mb it would help at least i hope so.

https://dropmefiles.com/PWGy2   - files are here
Also ive noticed 2x files cpriv and cpriv2 may be those are keys or so ?

 

Big thanks!


Edited by Rvn48, 23 May 2022 - 11:00 AM.


#6 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 23 May 2022 - 02:58 PM

There is nothing new to report that I am aware of.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#7 Rvn48

Rvn48

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:45 AM

Posted 23 May 2022 - 03:02 PM

There is nothing new to report that I am aware of.

Thank you anyway for response!



#8 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 23 May 2022 - 03:07 PM

You're welcome.

 
When or if a free (or legitimate paid for) decryption solution is found, that information will be provided in this support topic and victims will receive notification if subscribed to it. In addition, a news article most likely will be posted on the Bleeping Computer front page. Amigo-A (Andrew Ivanov) will also update the applicable Crypto-Ransomware Digest (Alphabetical Index).

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#9 yura_tor4ok

yura_tor4ok

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 12 July 2022 - 04:30 PM

Hi everyone!
I got this virus. I wrote to extortionists and paid. In response, they did not send anything and stopped responding. I started looking for information on the Internet about this virus.
And I saw on one site id-ransomware.blogspot.com that if extortionists do not send a decoder after payment, they need to write to such and such an address. I wrote to that address, they say so and so,
- I paid, and in response, silence. I was dropped a link to a file hosting service with a type decoder. Downloaded, but it does not decrypt anything. I wrote to the extortionists, gave a screen of the problem - in response - we cant help in any way and then they dont answer letters.

A couple of days later they write to the mail from another address with the text - "pay extra and we will decrypt your files." I explain that I have already paid as agreed, but my files have not been decrypted. What are the guarantees that after the second payment you will not deceive? But in response they write - "if you do not pay, then your files will be freely available on the Internet"

If you caught this virus -
DO NOT PAY THEM!!! These are scammers and they have no decoder.

#10 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 12 July 2022 - 04:37 PM

The experience you describe is not uncommon and one reason why most security experts will advise against paying the ransom demands or engage in negotiating a payment with the malware developers. The criminals may demand more money after payment or even send you something containing more malware or a fake decryptor. So why should you trust anything said or provided by those who infected you to begin with? I explain in more detail why victims should not pay the ransom in this topic which includes victim experiences relating to dealing with or negotiating with the malware developers.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#11 yura_tor4ok

yura_tor4ok

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 12 July 2022 - 04:45 PM

The experience you describe is not uncommon and one reason why most security experts will advise against paying the ransom demands or engage in negotiating a payment with the malware developers. The criminals may demand more money after payment or even send you something containing more malware or a fake decryptor. So why should you trust anything said or provided by those who infected you to begin with? I explain in more detail why victims should not pay the ransom in this topic which includes victim experiences relating to dealing with or negotiating with the malware developers.





I started looking for information about this virus late. now there is exactly one example (me) confirming in practice that these scammers do not need to pay!

#12 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:45 AM

Posted 13 July 2022 - 12:42 AM

yura_tor4ok

Уже как минимум три человека сообщили, что вымогатели не платят и просят еще денег. 

Напишите комментарий после статьи, чтобы подтвердить это. 

https://id-ransomware.blogspot.com/2021/10/lokilocker-ransomware.html

There are already at least three people who reported that extortionists do not pay and ask for more money.
You need to write a comment after the article to confirm this fact.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#13 ApachePunk

ApachePunk

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:10:45 PM

Posted 01 September 2022 - 05:14 PM

Hi.

 

still no solution for this ransomware?

 

Unfortunately, there is no known method that I am aware of to decrypt files encrypted by Loki Locker Ransomware without paying the ransom and obtaining the private encryption keys from the criminals who created the ransomware unless they are leaked or seized & released by authorities. Without the criminal's master private key that can be used to decrypt your files, decryption is impossible. That usually means the private key is unique (specific) for each victim and generated in a secure way (i.e. RSA, AES, Salsa20, ChaCha20, ECDH, ECC) that cannot be brute-forced...the public key alone that encrypted files is useless for decryption.
 
If feasible, your best option is to restore from backups, try file recovery software to recover (not decrypt) some of your original files or backup/save your encrypted data as is and wait for a possible solution at a later time.



#14 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 01 September 2022 - 05:15 PM

There is nothing new to report that I am aware of.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#15 ApachePunk

ApachePunk

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:10:45 PM

Posted 02 September 2022 - 01:07 PM

Thank You!

 

There is nothing new to report that I am aware of.






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users