Any files that are encrypted with Phobos Ransomware will have an <ID>-<victim id*** random 8 hex char>.[<email>] or <id>-<victim id*** random 8 hex char-4 numbers>.[<email>] followed by one of its many different extensions appended to the end of the encrypted data filename as explained here by Amigo-A (Andrew Ivanov). The victim id (8 random hex characters) is the victim's Windows volume serial number and the four numbers afterwards is the Phobos build ID. These are a few examples.
.ID-3EA0B923.[job2019@tutanota.com].phobos .ID-2CA6D4CB.[prejimzalma1972@aol.com].phoenix .id[F6593DDC-2275].[raynorzlol@tutanota.com].Adame .id[4E462CCA-3412].[helprecover@foxmail.com].help .id[06FB70EE-2542].[wmanxtere@privatemail.com].google .id[E4827465-4422].[silverhand@onionmail.org].Elbie
Phobos Ransomware extensions include .phobos, .Frendi, .phoenix, .mamba, .KARLOS, .ACTIN, .ACTOR, .com, .adage, .WALLET, .1500dollars, .acute, .Adame, .help, .banjo, .Acton, .Banta, .zax, .HORSELIKER, .BORISHORSE, .BANKS, .PLUT, .WannaCry, .Caleb, .elder, .deal, .Adair, .Acuna, .Barak, .octopus, .calix, .deuce, .angus, .Calum, .Caley, .Dever, .DDoS, .elbow, .karma, .bablo, .DEWAR, .Devos, .devil, .revon, .eight, .Devon, .eking, .chinz, .isos, .Acuff, .ELDAOLSA, .google, .Antivirus, .DLL, .LOWPRICE, .eject, .HORSEMONEY, .WIN, .PERDAK, .XIII, .Drik, .pHv1, .Elbie, .ZOZL, .MURK, .DIKE .decrypt, .Banta, .grt, .LIZARD, .duck, .faust, .magic, .worry, .SHTORM, .SDK, .2QZ3, .kmrox, .top, .s4b, .6y8dghklp, .deep, .luck, .deepindeep, .VXUG, .LEAKDB, .GrafGrafel, .elpy, .HuiVJope, .2700, .mango, .jopanaxye, .gotmydatafast, .rdptest, .ebaka
Phobos typically will leave files (ransom notes) named Phobos.hta, Encrypted.txt, Data.hta, info.hta and info.txt.
Be aware of below scammers.
1- Email: helpransomfiles@gmail.com / providenciagerente@gmail.com - Telegram: @Helpransomware - YouTube: @HelpRansomware - Mobile: +1 515 506 85222- Email: help.encryptorr@gmail.com - Telegram: @Encryptor_man3- Telegram: @Amir79ce (working with above item 1)4- Telegram: @rudecryp (working with above item 1)5- Telegram: @phobos_supports6- Telegram: @File0017- Telegram: @datadecrypt8- Email: decrypt2023@cyberfear.com / decrypt2023@cock.li - Telegram: @decrypt20239- Email: rsaransom@tuta.io - Telegram: @RSARansom - YouTube: @rsaransom and @rsaransomdecryptor675210- Telegram: @decryptyourdata11- Telegram: @Decryptorr12- Email: helpermail@onionmail.org13- Email: admencrypt@gmail.com; admdecrypt@gmail.com - Telegram: Pcrisk14- Email: targetchamin@gmail.com15- Telegram: Phobos_support16- Telegram: RansomwareRescue
NOTE: PhobosImposter is a variant of ABCD (LockBit) which appends .phobos extension and leaves files (ransom notes) named Restore-My-Files.txt...see PhobosImposter Ransomware.
Hi everybody, I've been affected by a ransomware that has the extension .phobos but ID ransomware is unable to determine what ransomware it is. ID ransomware gives me this SHA1: 009d37c802481f54de74c44bfa7dca046daade8b
There is not any ransom note either.
This is the text of the extension: "ID-3EA0B923.[job2019@tutanota.com].phobos"
I've contacted with that e-mail account and have the next response:
"Hello! The cost of the decryption program at the moment is $ 3000[/size]
For payment you have 6 hours - you need to buy bitcoin and pay for my wallet.
If you do not pay the decryption program within 6 hours - the price will be $ 5000
Buy bitcoin is best on the site https://localbitcoins.com , choose your country - buy Bitcoin
and pay to my wallet: 1CTzR5oW4uQdY3xhHnmisD3M8shh7qcd6e
After you pay, you will receive all the necessary instructions to decrypt your files."
Anyone has any idea to uncrypt the files?
Thank you