ABCLocker ransomware virus - How to remove

ABCLocker, according to the label of Generic.Ransom.CloudSword that it has received, is based on CloudSword variant that we had managed to dig out back in January of 2017. Even its payload its called cloudsword.exe which creates an even stronger link between these two samples. The technique of file-corruption that the ransomware has selected to go with is AES-256 CBC encryption which will generate two unique keys: public one for encoding, and private one, concealed in hackers’ private servers. ABCLocker crypto virus could pretend to be an update for Windows as its payload, in the FileDescription section, is explained to be “Windows Update”. Also, we have not been informed about a specific extension that would be appended to the damages files.

Analysis of this crypto-virus

Compared to CloudSword, ABCLocker is similar to it as it also operates with a TOR browser: in fact, it has the same website of What is more, in cases of both variants, victims are required to make a full payment in 5 days. One peculiar was found while analyzing the recent threat: in its structure, it has a quote from Seneca “Ab honesto virum bonum nihil deterret. (Nothing deters a good man from doing what is honorable).

ABCLocker virus

Hackers offer a service of file-unlocking, if a specific amount of money gets paid without any disagreements. This transaction is supposed to be done in 5 days time after a screen-locker will be launched and block users’ access to their devices. For some, it might be that the desktop’s background will be remodeled. 0.5 BTC are being demanded to be sent to hackers. The attackers might be from Europe as they convert these bitcoins to euros.

However, the 0.5 BTC is converted extremely incorrectly, as it is explained that it equals approximately from 259 to 275 euros. In the real market, this amount of BTC translates into 1146.12 euro. If the ransom does not reach hackers in 120hours, the ransom will hit a huge number: 1 BTC. This might not seem like a lot, but if you would convert it into more understandable currencies, it would equal 2292.24 euros.

In the ransom note, hackers’ also give instructions how bitcoins should be purchased and end up in their wallets. We emphasize on the fact that victims should not feel convinced to pay these gigantic sums of money. If people are encountering any issues during the process of making the transactions, they are welcome to contact hackers via [email protected].

The payload of the infection is quite deceptive and evasive: it attempts to hide its presence until the money is right. According to teams of researchers that have investigated this case, this sample is not as dull as many HiddenTear lookalikes. From the mentioned details, hackers knew exactly what they were doing when creating the ABCLocker crypto-virus.

How to recover files, get rid of this ransomware and stay safe

Currently, we are not aware of a tool for decryption that would help people treat their files to recovery. However, there are alternative options to consider: find out more about them in the last sections of this page. Of course, the best thing would have been for you to back up your data in storages or other secure locations that would have made file-recovery extremely easy.

It is clear that file-decryption should be attempted if the crypto-virus is still present in your operating system. Exploit Spyhunter or Malwarebytes to eliminate the threat and make way for the file-recovery.

If you do not wish to be stuck in similar situations in the future, we are proposing you stop visiting domains that could be interested in ruining your device. Infections with malware can occur in a number of ways, starting from stealthy drive-by downloads and ending with peer-to-peer networks that can trick people into downloading malware themselves. However, we predict that this infection could be distributed thanks to spam emails and unprotected remote desktop protocols.

How to recover ABCLocker ransomware virus encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:

for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again.CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before ABCLocker ransomware virus has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3

Step 2. Complete removal of ABCLocker ransomware virus

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Spyhunter and remove all malicious files related to ABCLocker ransomware virus. You can check other tools here.  

Step 3. Restore ABCLocker ransomware virus affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually ABCLocker ransomware virus tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so. Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer. a) Native Windows Previous Versions Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
Previous version
b) Shadow Explorer It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover ABCLocker ransomware virus encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download a data recovery program.
  • Install and scan for recently deleted files. Data Recovery Pro
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.
Leave a Reply

Your email address will not be published. Required fields are marked *