Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Proxima/BlackShadow Ransomware (.proxima, .BlackShadow, .X) Support Topic


  • Please log in to reply
38 replies to this topic

#1 zjdaher

zjdaher

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:16 PM

Posted 13 February 2023 - 06:18 AM

Any files that are encrypted with Proxima Ransomware will have a .Proxima, .Cylance, .Lattice, .Phalcon extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named PROXIMA_README.txt, CYLANCE_README.txt, LATTIVE_README.txt, PHALCON_RECOVER.txt.
 
Any files that are encrypted with Proxima/BlackShadow will have a .BlackShadow, .BlackSh, .BlackStore, .ZeroCool, .Black, .X, .Gomez, .Jarjets, .Daniel, .Xray, .Mikel, .Tisak, .SNet, .Jack, .uploaded, .transferred, .Antoni, .sysinfo, .Sezar, .Lambda, .[random 9].Synapse (GbFk7VeUI.Synapse), .arthur extension appended to the end of the encrypted data filename as explained here by rivitna (Andrey Zhdanov) and here by Amigo-A (Andrew Ivanov).
 
Proxima/BlackShadow typically will leave files (ransom notes) named #FILE ENCRYPTED.txt, BlackSh_Help.txt, BlackShadow_Help.txt, BlackStore_Help.txt, ZeroCool_Help.txt, Black_Recovery.txt, X-Help.txt, Gomez_Recover.txt, Jarjets_ReadMe.txt, Off_Help.txt, Daniel_Help.txt, Xray_Help.txt, Tisak_Help.txt, Mikel_Help.txt, Jack_Help.txt, DecryptNote.txt, Recovery_Instructions.txt, HOW_TO_RESTORE_FILES.txt, Antoni_Recovery.txt, Sezar_Recovery.txt, LAMBDA_README.txt, [random 9].README.txt (GbFk7VeUI.README.txt), Arthur_help.txt.
 
In some cases the ransom notes include the same appended extension_Help.txt as part of the note's name.
 

 

 

Hello;

 

we've been hit by Proxima Ransomware. anyone has help in decrypting the files?



BC AdBot (Login to Remove)

 


#2 zjdaher

zjdaher
  • Topic Starter

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:16 PM

Posted 13 February 2023 - 06:21 AM

all files encrypted with .proxima and the sender's domain is onionmail.org and cyberfear.com



#3 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 AM

Posted 13 February 2023 - 08:42 AM

Did you find any ransom notes? If so, what is the actual name of the ransom note?
Can you provide (copy & paste) the ransom note contents in your next reply?
 
Proxima Ransomware uses the .proxima extension and leaves ransom notes named Proxima_Readme.txt.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#4 zjdaher

zjdaher
  • Topic Starter

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:16 PM

Posted 13 February 2023 - 08:44 AM

[~] Proxima Ransomware

>>> What's happened?
    ALL YOUR FILES ARE STOLEN AND ENCRYPTED.
    To recovery your data and not to allow data leakage, it is possible only through purchase of a private key from us.

>>> What guarantees?
    Before paying you can send us a small-sized file (a non-important file), and we will decrypt it for free as guarantee.

>> How will the decryption process proceed after payment?
    After payment, we will send you our decryption program + detailed instructions for use. With this program, you will be able to decrypt all your files.
    If some files has encrypted but not renamed; these files will be restored after the decryption procedure is completed.

>>> CONTACT US:
    Please write an email to: XXX@onionmail.org and XXX@cyberfear.com
    Write this ID in the title of your message: XXXX

>>> ATTENTION!
    Do not rename or modify encrypted files.
    Do not try to decrypt using third party software, it may cause permanent data loss.
    Decryption of your files with the help of third parties may cause increased price(they add their fee to our).
    We use hybrid encryption, no one can restore your files except us.
    remember to hurry up, as your email address may not be available for very long.
    All your stolen data will be loaded into cybercriminal forums/blogs if you do not pay ransom.

 


Edited by zjdaher, 13 February 2023 - 08:56 AM.


#5 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 AM

Posted 13 February 2023 - 08:47 AM

There is no known method that I am aware of to decrypt files encrypted by Proxima Ransomware without paying the ransom (not advisable) and obtaining the private encryption keys from the criminals who created the ransomware unless they are leaked or seized & released by authorities. Without the criminal's master private key that can be used to decrypt your files, decryption is impossible. That usually means the key is unique (specific) for each victim and generated in a secure way (i.e. RSA, AES, Salsa20, ChaCha20, ECDH, ECC) that cannot be brute-forced.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#6 zjdaher

zjdaher
  • Topic Starter

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:16 PM

Posted 13 February 2023 - 08:49 AM

on one of the servers the readme file has a key in it. Assuming it is the key, how can it be used to try and decrypt?



#7 zjdaher

zjdaher
  • Topic Starter

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:16 PM

Posted 13 February 2023 - 08:51 AM

i know it's a long shot and perhaps it's not the key, but you never know,



#8 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 AM

Posted 13 February 2023 - 09:03 AM

The public key alone that encrypted files is useless for decryption. 
 
If feasible, your best option is to restore from backups, try file recovery software to recover (not decrypt) some of your original files or backup/save your encrypted data as is and wait for a possible solution at a later time.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#9 zjdaher

zjdaher
  • Topic Starter

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:16 PM

Posted 13 February 2023 - 09:10 AM

sorry to post again, below is the readme from one of the servers that has the key in it. in all the messages i saw online for ransomware, none had a key at the bottom of the readme. that is why I suspect it might be an issue in the actual ransomware program displaying the private key used. i replaced XXX below

 

 

 

 

 

 

[~] Proxima Ransomware

>>> What's happened?
    ALL YOUR FILES ARE STOLEN AND ENCRYPTED.
    To recovery your data and not to allow data leakage, it is possible only through purchase of a private key from us.

>>> What guarantees?
    Before paying you can send us a small-sized file (a non-important file), and we will decrypt it for free as guarantee.

>> How will the decryption process proceed after payment?
    After payment, we will send you our decryption program + detailed instructions for use. With this program, you will be able to decrypt all your files.
    If some files has encrypted but not renamed; these files will be restored after the decryption procedure is completed.

>>> CONTACT US:
    Please write an email to: XXX@onionmail.org and XXX@cyberfear.com
    Write this ID in the title of your message: XXX

>>> ATTENTION!
    Do not rename or modify encrypted files.
    Do not try to decrypt using third party software, it may cause permanent data loss.
    Decryption of your files with the help of third parties may cause increased price(they add their fee to our).
    We use hybrid encryption, no one can restore your files except us.
    remember to hurry up, as your email address may not be available for very long.
    All your stolen data will be loaded into cybercriminal forums/blogs if you do not pay ransom.

======
KEY: 4OlYWpvbfH/BhH9bYdVsnr8h4Aq6FP9NeAz0EEKvz6I2JdRR1OM5fWJNGjdFVldsQwWvEzRvayF8oqkemzEANCkabVBndxioiyk9F9+XuMxpcvuqZVvm93wzLXIie5cjXDeZ5g==



#10 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 AM

Posted 13 February 2023 - 09:25 AM

Malware developers typically use a public and private key system where the public key is used to encrypt and the private key is used to decrypt. The private key is stored on a central server maintained by the cyber-criminals ensuring it is much harder to break unless at some point, law enforcement authorities track down, arrest the criminals, seize the C2 server, find and release the private RSA decryption keys to the public.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#11 zjdaher

zjdaher
  • Topic Starter

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:16 PM

Posted 14 February 2023 - 05:52 AM

i have attached the readme and some encrypted file, perhaps someone has the expertise in identifying the variant or a decryption tool

thanks

Attached Files



#12 TwoPack

TwoPack

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 14 February 2023 - 03:42 PM

....Hello

 

...Really this kind of encryption requires a powerful algorithm without the online key...because it is not necessary...and it is useless...!



#13 nichbeau

nichbeau

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:16 PM

Posted 21 October 2023 - 07:57 PM

Hi Everyone,

We are just a small family business, basically NFP... :(

We have received the following on our server along with all files having a .OFF extension and encrypted. 

We have tried a few ransomware decrypt tools and looked around, but there is very little about this extension of ransomware. 

 

 

//Extract from Off_Help.txt file

 

System ID: 9E1BD5BA4CACEBEA
 
We have stored all your data on our servers and locked them with the __Off__ suffix.
Your files have not been damaged or infected by virus; they are just inaccessible.
 
 
IF you want your files back, 
contact us at the following email addresses:
etc..
 
I have also attached an example of a encrypted file, is just one of the js files we use for our site, We can get back this type of file from backup, it is just an example..the issue is our encrypted MsSql database files on the server. 

Any help or advice would be very very much appreciated. 
 
Take care out there,
Nick


#14 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 AM

Posted 21 October 2023 - 08:32 PM

Please submit (upload) samples of encrypted files, ransom notes and any contact email addresses provided by the cyber-criminals to ID Ransomware (IDR) for assistance with identification and confirmation of the infection. ID Ransomware can identify ransomware which adds a prefix instead of an extension and more accurately identifies ransomware by filemarkers if applicable. Uploading both encrypted files and ransom notes together along with any email addresses provided gives a more positive match with identification and helps to avoid false detections. Please provide a link to the ID Ransomware results
 
Please attach the original (unedited) ransom note and several samples of encrypted files (different formats - doc, png, jpg) AND its original (unencrypted) file in a "zip file" for comparison so Amigo-A (Andrew Ivanov) or Demonslay335 (Michael Gillespie) can manually inspect them and possibly confirm the infection if either of them see this topic.

 
To attach files....Click the More Reply Options button in the bottom right corner of the Board Editor, then click the Choose File button under Attach Files.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#15 nichbeau

nichbeau

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:16 PM

Posted 21 October 2023 - 10:28 PM

Thank you for your reply. 

I am trying to find more encrypted vs decrypted files. 
In the mean time. 

Attached is the original ransomware request file

Attached is original and decrpypted image files as examples. 

 

Thank you for your time...

I will look for more.

 

 

 

Attached Files






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users