Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Loki Locker Ransomware (.Loki, .BlackBit) Support Topic


  • Please log in to reply
32 replies to this topic

#16 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 02 September 2022 - 02:24 PM

You're welcome.


.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


BC AdBot (Login to Remove)

 


#17 mikozee

mikozee

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:45 AM

Posted 28 November 2022 - 10:24 AM

I'm confused I wasn't asking for a way to decrypt the data nor if I was affect by loki or not. I was asking how to use file recovery that is recommended on the post template from posts like these and my topic was closed. Also, I found it odd it didn't lock every file and folder of my drive. My question is how do I use file recover to recover the videos and possible the locked cbr/cbz comics.?

 

 

 What I meant is do I delete windows clean install ( I don't care about the c drive there is nothing there I cannot restore even the plex metadata)? Download recuva and work on the loki locked externals? Also, why isn't every file and folder locked? Do these drives still have malware? I'm confused about loki and that was what my topic was about. I'm currently using linux and a mac to view these drives.


Edited by mikozee, 28 November 2022 - 10:39 AM.


#18 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 28 November 2022 - 03:18 PM

I referred you to this topic because it is the primary support topic for Loki ransomware. This way other victims with similar questions could read possible solutions, answer questions and provide possible suggestions.
 
Of course you can always choose to do a reinstall of Windows (clean install/reformat) instead which will remove ransomware related malicious files.
 
As for specific instructions related to recovery software....that will depend on what recovery software you are using since each vendor has varying instructions.

Data Recovery Tools

.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#19 mikozee

mikozee

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:45 AM

Posted 28 November 2022 - 05:09 PM

I just realized something. If two identical disks as identified by win merge were hit by loki, will Winmerge still identify them as identical despite being encrypted post ransomware? This is what happened to me as 2 out of 4 different disks were online while 2 out of 4 with some obsolete content were offline. My set up works in pairs and I forgot to take at least one of it offline before the event. So I'm missing about a weeks worth of content I can't identify.But my backups are not that old so it's not a huge issue.



#20 Vicky_321

Vicky_321

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:08:15 AM

Posted 24 March 2023 - 12:44 AM

DO NOT PAY LOKI LOCKER
Lokisupp0rt@yandex.comlokiloki@mailfence.com

Hello All,
I am one of the victims of LokiLoker, they are scammers. These guys  locked my files lokiloki@mailfence.com, and the ransom note had these 2 email ID's Lokisupp0rt@yandex.comlokiloki@mailfence.com. We paid them twice as they did not send the decrypter after receiving the first payment and we had to make another payment to get the decrypter. After receiving both the payments these guys sent a decrypter but the decrypter which they sent did not work my files.And the worst part is they are asking access to my machine to decrypt the files saying the problem is with my computer when i had clearly explained to them that i had tried to decrypt the files on a clean computer.



#21 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 24 March 2023 - 04:43 AM

I have merged your topic into the primary support topic for victims of this ransomware.

 

The experience you describe is not uncommon and one reason why most security experts will advise against paying the ransom demands or engage in negotiating a payment with the malware developers. There is never a guarantee that paying the ransom will actually result in decryption (restoration) of your files. The criminals may have no intention to decrypt your files, demand more money after payment or even send you a fake decryptor. So why should you trust anything said or provided by those who infected you to begin with? I explain in more detail why paying the ransom is not advisable in this topic which includes victim experiences dealing with these types of criminals.

.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#22 Fighter84

Fighter84

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:45 AM

Posted 18 July 2023 - 05:52 AM

Hello Community, 
 

Please I need help to recover the files encrypted by killer ransomware. all files are crypted and have the .kill extension

I attach an encrypted file and also the file with instructions done by the hackers
 

I did lot of research for a decryptor but this ransomware is not recongnized by decryptors

 

Best Regards

Attached Files



#23 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 18 July 2023 - 07:27 AM

The contents of your ransom note are similar to what we have seen with some variants of Loki Locker Ransomware.
 

Your #FILES-ENCRYPTED.txt

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: Decryption.helper@aol.com
In case of no answer in 24h, send e-mail to this address: helper@cyberfear.com
Your System ID : 689DBE54
!!!Deleting "xor.689DBE54.kill" causes permanent data loss.

....

+Ways to contact us:
Our Email:
Decryption.helper@aol.com
helper@cyberfear.com
Your System ID: 689DBE54

Loki Locker (BlackBit) - Restore-My-Files.txt

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: spystar@onionmail.org
In case of no answer in 24h, send e-mail to this address: spystar1@onionmail.com
You can also contact us via Telegram: @Spystar_Support
All your files will be lost on Thursday, October 20, 2022 9:51:06 AM.
Your SYSTEM ID : 8E4A8CF5
!!!Deleting "Cpriv.BlackBit" causes permanent data loss.

 

Loki Locker - Restore-My-Files.txt

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: Lollooki@protonmail.com
In case of no answer in 24h, send e-mail to this address: Lollooki@yandex.com
All your files will be lost on Wednesday, 28 December 2022 4:30:12 am.
Your SYSTEM ID: 52294877
!!!Deleting "Cpriv.Loki" causes permanent data loss.
 

 

Is .kill the full extension appended to the end of the encrypted data filename or is there an .[email], an ID number with random characters (.id-A04EBFC2, .id[4D21EF37-2214]), an ID number with an email address (.id-BCBEF350.[<email>], .id[7A9B748C-1104].[<email>]), an ID number with a person's name (.[a7fth62bc1].[<name>]) or just a series of random characters (.8SLV8GMp-hjqo9v3s) preceding the extension?
 
Any files that are encrypted with Loki Locker Ransomware will have an [<email>][<ID 8 random characters>]<filename>.[extension] followed by the .Loki, .BlackBit, .Rainman, .PayForKey, .Adair, .Boresh, .onion700, .DATA extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named Restore-My-Files.txt, info.hta as explained here by Amigo-A (Andrew Ivanov). These are some examples.

.[lolooki@protnmail.com][7E09E942]<filename>.mp4.Loki
.[DecNow@TutaMail.Com][7E09E942]<filename>.pdf.Loki
.[spystar@onionmail.org][9ECFA84E]<filename>.jpg.BlackBit
.[Onion749@onionmail.org][52294877]<filename>.log.onion700

.[crypter@firemail.de][43DE62EH]<filename>.jpg.kill


.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#24 Fighter84

Fighter84

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:45 AM

Posted 18 July 2023 - 09:45 AM

 

The contents of your ransom note are similar to what we have seen with some variants of Loki Locker Ransomware.
 

Your #FILES-ENCRYPTED.txt

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: Decryption.helper@aol.com
In case of no answer in 24h, send e-mail to this address: helper@cyberfear.com
Your System ID : 689DBE54
!!!Deleting "xor.689DBE54.kill" causes permanent data loss.

....

+Ways to contact us:
Our Email:
Decryption.helper@aol.com
helper@cyberfear.com
Your System ID: 689DBE54

Loki Locker (BlackBit) - Restore-My-Files.txt

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: spystar@onionmail.org
In case of no answer in 24h, send e-mail to this address: spystar1@onionmail.com
You can also contact us via Telegram: @Spystar_Support
All your files will be lost on Thursday, October 20, 2022 9:51:06 AM.
Your SYSTEM ID : 8E4A8CF5
!!!Deleting "Cpriv.BlackBit" causes permanent data loss.

 

Loki Locker - Restore-My-Files.txt

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: Lollooki@protonmail.com
In case of no answer in 24h, send e-mail to this address: Lollooki@yandex.com
All your files will be lost on Wednesday, 28 December 2022 4:30:12 am.
Your SYSTEM ID: 52294877
!!!Deleting "Cpriv.Loki" causes permanent data loss.
 

 

Is .kill the full extension appended to the end of the encrypted data filename or is there an .[email], an ID number with random characters (.id-A04EBFC2, .id[4D21EF37-2214]), an ID number with an email address (.id-BCBEF350.[<email>], .id[7A9B748C-1104].[<email>]), an ID number with a person's name (.[a7fth62bc1].[<name>]) or just a series of random characters (.8SLV8GMp-hjqo9v3s) preceding the extension?
 
Any files that are encrypted with Loki Locker Ransomware will have an [<email>][<ID 8 random characters>]<filename>.[extension] followed by the .Loki, .BlackBit, .Rainman, .PayForKey, .Adair, .Boresh, .onion700, .DATA extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named Restore-My-Files.txt, info.hta as explained here by Amigo-A (Andrew Ivanov). These are some examples.

.[lolooki@protnmail.com][7E09E942]<filename>.mp4.Loki
.[DecNow@TutaMail.Com][7E09E942]<filename>.pdf.Loki
.[spystar@onionmail.org][9ECFA84E]<filename>.jpg.BlackBit
.[Onion749@onionmail.org][52294877]<filename>.log.onion700

.[crypter@firemail.de][43DE62EH]<filename>.jpg.kill

 

Thanks for replying

The files are encrypted and the their names are changed as you said [Decryption.helper@aol.com][689DBE54].filename.kill

is there any way to decrypt them



#25 al1963

al1963

  •  Avatar image
  • Members
  • 1,151 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 18 July 2023 - 09:46 AM

@Fighter84,

 

Can I add two more files? one encrypted file and "xor.689DBE54.kill" into an archive, upload the archive to sendspace.com, and give us the archive download link in your message.



#26 Fighter84

Fighter84

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:45 AM

Posted 18 July 2023 - 10:32 AM

@Fighter84,

 

Can I add two more files? one encrypted file and "xor.689DBE54.kill" into an archive, upload the archive to sendspace.com, and give us the archive download link in your message.

Done
I've sent you the link



#27 al1963

al1963

  •  Avatar image
  • Members
  • 1,151 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 18 July 2023 - 10:39 AM

Agree with Global Moderator quietman7

 

With a high probability this is a variant of Loki Locker.

Check in the antivirus quarantine there should be a file called winlogon.exe.

This will be the body of the ransomware.



#28 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 18 July 2023 - 03:49 PM

@Fighter84

Since the infection has been identified/confirmed and this is a new variant, I merged your topic into the primary support topic for victims of this ransomware.


.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#29 Fighter84

Fighter84

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:45 AM

Posted 02 August 2023 - 08:23 AM

I have recovered a huge part of my encrypted files.
So if someone has the same issue I can try to help, contact me with direct message



#30 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:45 PM

Posted 02 August 2023 - 08:27 AM

If you are able to assist other victims, then do so in this support topic.

 

By Bleeping Computer policy (Forum Rules), all help must be provided in the forums...specifically this part.

All help must be provided in the forums or on our Discord Server. We do not allow support to be provided or requested via personal message, email, or remote desktop control programs (Logmein, TeamViewer, etc).

Thanks,
The BC Staff


.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users