Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

REDCryptoApp Ransomware (.REDCryptoApp) Support Topic


  • Please log in to reply
8 replies to this topic

#1 alex_jvg

alex_jvg

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 25 March 2024 - 06:36 PM

Hello, does anyone have information that can help us decrypt the data?

I am attaching an encrypted sample and the ransom note

From what little I know, they are a new group, It seems that we are its first victims 🥴

 

Extension files: REDCryptoApp

 

This came up when I consulted ID Ransomware:
SHA1: 6fe20b1b2ab6f8f614ae0e9ed94c2728f0d6b297

Attached Files



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 25 March 2024 - 08:02 PM

Looks new to me. I can't find any search results as of today other than this topic.

 

HOW_TO_RESTORE_FILES.REDCryptoApp.txt ransom note contents.

Attention!

 
----------------------------
| What happened?
----------------------------
 
We hacked your network and safely encrypted all of your files, documents, photos, databases, and other important data with reliable algorithms.
You cannot access your files right now, But do not worry You can get it back! It is easy to recover in a few steps.
 
We have also downloaded a lot of your private data from your network, so in case of not contacting us these data will be release publicly.
Everyone has a job and we have our jobs too, there is nothing personal issue here so just follow our instruction and you will be ok.
Right now the key of your network is in our hand now and you have to pay for that.
Plus, by paying us, you will get your key and your data will be earse from our storages and if you want you can get advise from us too, in order to make your network more than secure before.
 
----------------------------
| How to contact us and get my files back?
----------------------------
 
The only method to decrypt your files and be safe from data leakage is to purchase a unique private key which is securely stored in our servers.
 
To contact us and purchase the key you have to get to the link below :
 
Onion Link : 
 
Hash ID : iuemspodbrympdbrvrefojkxwbbpjlugsqhweofvlbaakqyhnrdlkqngvgjtfyai
 
!Important! : This is a unique link and hash for your network so don't share these with anyone and keep it safe.
 
----------------------------
| How to get access to the Onion link ?
----------------------------
Simple :
 
1- Download Tor Browser and install it. (Official Tor Website : torproject.org)
2- Open Tor Browser and connect to it.
3- After the Connection, Enter the Onion Link and use your Hash ID to login to your panel.
 
----------------------------
| What about guarantees?
----------------------------
 
We understand your stress and worry.
So you have a FREE opportunity to test a service by instantly decrypting for free some small files from your network.
after the payment we will help you until you get your network back to normal and be satesfy.
 
 
Dear System Administrators,
Do not think that you can handle it by yourself.
By hiding the fact of the breach you will be eventually fired and sometimes even sued.
Just trust us we've seen that a lot before.
 
 
----------------------------
| Follow the guidelines below to avoid losing your data:
----------------------------
!Important!
 
 -Do not modify or rename encrypted files. You will lose them.
 -Do not report to the Police, FBI, EDR, AV's, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything.
 -Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are smarter than us and they can trick us, but it is not. They usually fail. So speak for yourself.
 -Do not reject to purchase, Exfiltrated files will be publicly disclosed.
 
!Important!
-------------------------------------------------------------------------------

 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#3 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:45 AM

Posted 25 March 2024 - 11:53 PM

visitaWEB.txt.REDCryptoApp

 

The file visitaWEB.txt.REDCryptoApp is not encrypted.
Remove the .REDCryptoApp extension and open it.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#4 alex_jvg

alex_jvg
  • Topic Starter

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 26 March 2024 - 01:03 AM

Yes, on their wall of shame we were 12 accounts 🫣, all of us had the same date of publication at the end of february
 



#5 alex_jvg

alex_jvg
  • Topic Starter

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 26 March 2024 - 01:08 AM

 

visitaWEB.txt.REDCryptoApp

 

The file visitaWEB.txt.REDCryptoApp is not encrypted.
Remove the .REDCryptoApp extension and open it.

 

I will check the rest of the files, there are a few that I am really interested in recovering, I noticed that when I left a scan to the HDD and some images were displayed even having the REDCryptoApp extension.



#6 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:45 AM

Posted 26 March 2024 - 01:15 AM

If "File History" has been enabled, then on each file you can use this option to restore the previous version of the file.

---

 

Info added to the article REDCryptoApp Ransomware

Attached Files

  • Attached File  12-w.png   52.52KB   0 downloads

Edited by Amigo-A, 26 March 2024 - 11:27 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#7 alex_jvg

alex_jvg
  • Topic Starter

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 26 March 2024 - 02:06 PM

If "File History" has been enabled, then on each file you can use this option to restore the previous version of the file.

---

 

Info added to the article REDCryptoApp Ransomware

I had windows shadow copies enabled, but they were deleted :/ 



#8 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 26 March 2024 - 03:07 PM


I had windows shadow copies enabled, but they were deleted

Most crypto malware and wipers typically will delete all shadow copy snapshots (created if System Restore was enabled) with vssadmin.exe as explained here. The deletion is intentional so that you cannot restore your files from before they had been encrypted using Windows Previous Versions or programs like Shadow Explorer and ShadowCopyView.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#9 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 26 March 2024 - 07:05 PM

REDCryptoApp Ransomware


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users