Depth-Analysis on Meteoritan Ransomware
Meteoritan Ransomware is a new file-encryption virus reported on 22nd March 2017 by the cyber security experts. It is a crypto-malware which is especially designed to invade the targeted computer with the help of malicious macro scripts embedded on corrupted files or documents which arrived the machine through spam email message. The main objective of this virus is to alter the content stored on the victim’s machine in order to make those files inaccessible. As a matter of fact, a ransom message will be displayed on the infected system’s screen. In the displayed ransom notification, the hackers demand the user to pay a hefty sum of ransom money in the form of Bitcoins in order to get the decryption tool, which claims to decode the files affected by Meteoritan Ransomware.
How To Detect the Presence of Meteoritan Ransomware?
The malware is named just after the wake of logo which is displayed onto the users computer screen after the ransomware has finished its malicious operation onto the targeted system. This logo features a name reported as “Meteoritan Ransomware” and also features a wave sign which is colored in orange and red. This ransomware is known to target the PC users in Central Australia, South America, North America and Western Europe. It can encrypt the files stored on removable media, local drives and the network shares. Although, the malware encipher the data by using a custom-built AES-256 encryption algorithm and then it generates a decryption key. However, th encoded files and data will lose their real thumbnails and icons, that were substituted for a generic white icon. Furthermore, the Meteoritan Ransomware doesn’t append the enciphered files name by adding any kind of specific file extension.
As a result, affected PC users may have difficulties in calculation the amount of data modified by this ransomware. It is especially programmed by the team of cyber criminals in order to work the threat in offline mode and uses RSA-2048 cryptographic algorithm to obfuscate the decryption tool. However, the decryption key can be found on the Temp directory which is saved under the name of “METEORITAN.RAMSOM”. Moreover, affected PC users are suggested to open a file identified as “METEORITAN.POLAN” for the ID number. Then after, it will place two files onto the system’s desktop named as “readme_your_files_have_been_encrypted.txt” and “where_are_your_files.txt” which serves as a ransom notifications. However, you should not contact the virus developers by writing a mail to “[email protected]”. Instead, eliminate Meteoritan Ransomware threat from your PC as soon as possible and recover the files by using backup copies.
Follow Steps to Remove Meteoritan Ransomware from PC
Step 1: Know How to Reboot Windows PC in Safe Mode (This guide is meant for novice users)
Step 2: Meteoritan Ransomware removal Using System Restore
Still, if you are facing problem in rebooting PC in Safe mode, opt for System Restore. Follow the steps given below.
Prss F8 continously until you get Windows Advanced Options Menu on Computer Monitor. Now Choose Safe Mode with Command Prompt Option and Tap enter
In the Command Prompt Windows, you need to type this command : cd restore and Select Enter
Now type rstrui.exe as command and press on Enter
This will open a new window to Restore System Files and Settings. Click on Next to proceed.
Kindly select the Restore Point from the date you want to restore back your system as it was earlier to Meteoritan Ransomware attack
Step 3 Use ShadowExplorer to Restore Meteoritan Ransomware Encrypted Files
Alternatively, you can also use ShadowExplorer to Restore Encrypted files due to Meteoritan Ransomware Attack.
When Meteoritan Ransomware attacks it generally tries to delete all shadows copies which is stored in your computer. But there are chances that Meteoritan Ransomware is not able to delete the shadow copies everytime. So you need to restore the original files using shadow copies.
Follow these simple steps to restore original files through shadowexplorer
- you need to download shadowexplorer link from http://www.shadowexplorer.com/downloads.html
- Install it on your system
- Now you need to open shadowexplorer and select c: drive on left panel
Another method for recovering your decrypted files are file recovery software
If above methods are not successful you can go for file recovery software. It can be helpful in recovering your encrypted files as Meteoritan Ransomware first makes a copy of original files and then encrypt it. After encryption it deletes the original files. So there is high probability that these file recovery software can help you in recovering your original files.