Any files that are encrypted with C77L/X77C Ransomware will have an .[ID-random 8 char][<email>.[random 3 char], an .[<email>].[random 8 char], or a .[random 10].[random 8 char] extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named #Recover-Files.txt, #Restore-My-Files.txt, READ-ME.txt, READ-ME-Nullhexxx.txt. These are some examples.
.[ID-BAE12624][recovery-data09@protonmail.com].mz4 .[ID-80587FD8][Dm_for_decrypt@protonmail.com].3yk .[ID-9A7BE444][Decryptorkrypt@gmail.com].nb0 .[ID-646633FB][carolcarol0014410@gmail.com].1qb .[ID-8430E697][SuppDecFile@gmail.com].958 .[ID-C282F1FD][Evoteam.sup@gmail.com].14z .[ID-C4D676C5][SuppDecFile@gmail.com].9pf .[nullhex@2mail.co].8AA60918 .[mrdarkness@onionmail.org].40D5BF0A .p9MQBw6X.OXOfUbfa
The [random 8 char] is the 32-bit serial number of volume C and crypto scheme is: AES-256 CBC - RSA-2048. The criminal's AES session keys are needed to decrypt files.
Inside the encrypted files, the header starts with the text: "EncryptedByC77L", "LockedByX77C" or "EncryptRansomware"
C77L ransom notes are known to include a Decryption ID which is the same as the [random 8 char] (volume C serial number) found in the encrypted data file name.
\\\\ Your ID : {8AA60918}
Your Decryption ID: 40D5BF0A
Your Decryption ID: CE744A63
Your Decryption ID: BAE12624
Your Decryption ID: 80587FD8
C77L Ransomware Attackers Email List by rivitna (Andrey Zhdanov).



Back to top









