Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

C77L/X77C Ransomware (.[<email>].[random 8]; .[ID-random 8][<email>]) Support


  • Please log in to reply
70 replies to this topic

#1 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:39 PM

Posted 27 April 2025 - 06:05 AM

Any files that are encrypted with C77L/X77C Ransomware will have an .[ID-random 8 char][<email>.[random 3 char], an .[<email>].[random 8 char], or a .[random 10].[random 8 char] extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named #Recover-Files.txt, #Restore-My-Files.txt, READ-ME.txt, READ-ME-Nullhexxx.txt.  These are some examples.

.[ID-BAE12624][recovery-data09@protonmail.com].mz4
.[ID-80587FD8][Dm_for_decrypt@protonmail.com].3yk
.[ID-9A7BE444][Decryptorkrypt@gmail.com].nb0
.[ID-646633FB][carolcarol0014410@gmail.com].1qb
.[ID-8430E697][SuppDecFile@gmail.com].958
.[ID-C282F1FD][Evoteam.sup@gmail.com].14z
.[ID-C4D676C5][SuppDecFile@gmail.com].9pf
.[nullhex@2mail.co].8AA60918
.[mrdarkness@onionmail.org].40D5BF0A 
.p9MQBw6X.OXOfUbfa

The [random 8 char] is the 32-bit serial number of volume C and crypto scheme is: AES-256 CBC - RSA-2048. The criminal's AES session keys are needed to decrypt files.
 
Inside the encrypted files, the header starts with the text: "EncryptedByC77L", "LockedByX77C" or "EncryptRansomware"
 
C77L ransom notes are known to include a Decryption ID which is the same as the [random 8 char] (volume C serial number) found in the encrypted data file name.

\\\\ Your ID :  {8AA60918}
Your Decryption ID: 40D5BF0A
Your Decryption ID: CE744A63
Your Decryption ID: BAE12624
Your Decryption ID: 80587FD8

C77L Ransomware Attackers Email List by rivitna (Andrey Zhdanov).


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


BC AdBot (Login to Remove)

 


#2 Qazyna

Qazyna

  •  Avatar image
  • Banned Spammer
  • Member rank image
  • 5 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 04 May 2025 - 05:42 AM

Hello everyone! A couple of days ago, 2 servers and one computer were encrypted at night by an unknown encryptor. If someone can help with decryption, I am attaching files from two servers.

Attached Files



#3 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 649 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:39 AM

Posted 04 May 2025 - 07:10 AM

It's C77L ransomware

https://github.com/f6-dfir/Ransomware/tree/main/C77L



#4 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 649 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:39 AM

Posted 04 May 2025 - 07:24 AM

Crypto scheme:

AES-256 CBC - RSA-2048



#5 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:39 PM

Posted 04 May 2025 - 07:26 AM

.[nullhex@2mail.co].8AA60918 
  
READ-ME-Nullhexxx.txt contents

\\\\ All your files are encrypted...
All your files have been encrypted !!!
To decrypt them send e-mail to this address : nullhex@2mail.co
If you do not receive a response within 24 hours, Send a TOX message
TOX ID : 
        5551C47D78A6C295B805270C49D6C072095ABD5A1CD2545F1EABAA773CBF6A1C8231E8BF49CE
You can access it from here.
https://tox.chat
\\\\ Your ID :  {8AA60918}
        Enter the ID of your files in the subject !
\\\\  What is our decryption guarantee ?
Before paying you can send us up to 2 test files for free decryption !
The total size of files must be less than 2Mb.(non archived) !
Files should not contain valuable information.(databases,backups) !
Compress the file with zip or 7zip or rar compression programs and send it to us


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#6 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:39 PM

Posted 04 May 2025 - 07:38 AM

Since there is no existing support topic for this ransomware, I have changed the title to designate this one as such in order to direct other victims here.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#7 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 649 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:39 AM

Posted 04 May 2025 - 07:41 AM

8AA60918 - serial number of volume C



#8 Amigo-A

Amigo-A

    Security specialist and Ransomware expert. Volunteer Helper


  •  Avatar image
  • Members
  • 3,203 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:08:39 AM

Posted 04 May 2025 - 12:15 PM

Email 'blackpanther@mailum.com' used before in January - BlackPanther Ransomware with .Bpant
---
Q: What has happened?
A: Your files have been encrypted and now have the "Bpant" extension. They are unavailable because the file structure has been altered to an unreadable format.
Your vital information, such as databases, financial/developmental, accounting, and strategic papers, has been downloaded.
If You Need Your Files You Should Email us
You Can Send 1MB File For Decryption Test To Make Sure Your Files Can Be Decrypted(unimportnant file for free)
Your ID For Decryption: ***
Contact Us:
BlackPanther@mailum.com
blackPanther@firemail.eu
 
---
>>> ALL YOUR IMPORTANT FILES ARE STOLEN AND ENCRYPTED <<<
Important:
- We have downloaded your files. Your data will be leaked within the next 72 hours.
- Contact us immediately to prevent data leakage and recover your files.
Your Decryption ID: BADC0C0A
Contact:
- Email: blackpanther@mailum.com
- Telegram: @oupi2025
Warning:
- Tampering with files or using third-party tools WILL cause permanent damage.
- Act fast! The price will increase if you delay.
Free Decryption:
- Send 3 small files (max 1MB) for free decryption.

Edited by Amigo-A, 04 May 2025 - 12:36 PM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#9 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 649 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:39 AM

Posted 04 May 2025 - 02:32 PM

I'm quite aware of that

 

https://github.com/rivitna/Malware/blob/main/Proxima/attackers.txt

Attached Files

  • Attached File  0.png   4.73KB   1 downloads

Edited by rivitna, 04 May 2025 - 02:38 PM.


#10 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:39 PM

Posted 04 May 2025 - 06:30 PM

Please decrypt it


Maybe you missed this.

Crypto scheme:
AES-256 CBC - RSA-2048

That means it is secure and the criminal's master private key is needed for decryption. Without the criminal's master private key, decryption is impossible.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#11 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 649 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:39 AM

Posted 04 May 2025 - 06:43 PM

Please decrypt it

Unfortunately, session AES-256 keys are needed for decryption.

It is currently impossible to bruteforce them or factorize the RSA-2048 key


Edited by rivitna, 04 May 2025 - 06:47 PM.


#12 Qazyna

Qazyna

  •  Avatar image
  • Banned Spammer
  • Member rank image
  • 5 posts
  • OFFLINE
  •  
  • Local time:08:39 AM

Posted 04 May 2025 - 06:50 PM

Also, these guys from YouTube promise me decryption for an extra payment in the Bitcoin network
https://m.youtube.com/@Decryptfiles
https://m.youtube.com/@RansomwareRescue
https://m.youtube.com/@RansomwareDecryptoruniversal

#13 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:39 PM

Posted 04 May 2025 - 06:57 PM

They are scammers. Ransomware victims should ignore all Internet web searches which provide numerous links to bogus and untrustworthy ransomware removal guides, including Facebook and YouTube videos, many of which falsely claim to have decryption solutions.  Do not let yourself be victimized twice.

 

For more information, read What we know about those who claim they can decrypt data (Post #2), including scammers, the criminals and data recovery services.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#14 ctigga

ctigga

  •  Avatar image
  • Members
  • 242 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:39 PM

Posted 07 May 2025 - 12:48 AM

Nothing is impossible as long as you have access to the encrypted files. Saving the environment the files were encrypted in [deep copy] can also be helpful. Hang in there.

#15 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:39 PM

Posted 07 May 2025 - 06:16 AM

This is what I tell victims.
 
Imaging the hard drive backs up everything related to the infection including all encrypted data, ransom notes, key data files (if applicable) and registry entries containing possible information which may be needed in the event that a free decryption solution is ever discovered in the future. The encrypted files and ransom note text files do not contain malicious code so they are safe to back up.
 
Alternatively, you can remove the hard drive, store it away and replace it with a new hard drive with a fresh install of Windows. If a future decryption solution is ever found or the criminals arrested and master keys are seized and released to allow creation of a public decryptor, victims will have the original hard drive to restore their encrypted data.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users