Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

C77L/X77C Ransomware (.[<email>].[random 8]; .[ID-random 8][<email>]) Support


  • Please log in to reply
70 replies to this topic

#16 Auracomputer

Auracomputer

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:07 AM

Posted 30 May 2025 - 11:03 AM

Hello I am new to this community so I apologize if I miss format my post. I have attached the file that the criminals have left. Opening any of the encrypted files with notepad shows "LockedByX77" then proceeded with a bunch of corrupted text. 

I tried uploading an encrypted file but the website says "Error You aren't permitted to upload this kind of file" so I have changed it from the .y6y to .txt

 

#Restore-My-Files.txt contents

>>> ALL YOUR IMPORTANT FILES ARE STOLEN AND ENCRYPTED <<<
Important:
- We have downloaded your files. Your data will be leaked within the next 72 hours.
- Contact us immediately to prevent data leakage and recover your files.
Your Decryption ID: CE744A63
Contact:
Mail 1 blackdecryptor@gmail.com
Mail 2 decryptcore@gmail.com
- Telegram: @decryptcore
Warning:
- Tampering with files or using third-party tools WILL cause permanent damage.
- Act fast! The price will increase if you delay.
Free Decryption:
- Send 3 Small files (max 1MB) for free decryption

Attached Files



BC AdBot (Login to Remove)

 


#17 Auracomputer

Auracomputer

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:07 AM

Posted 30 May 2025 - 12:23 PM

The two attacker emails that are mentioned:
 

Mail 1 blackdecryptor@gmail.com
 
Mail 2 decryptcore@gmail.com


#18 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 649 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:07 AM

Posted 30 May 2025 - 12:26 PM

This is C77L ransomware



#19 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:07 PM

Posted 30 May 2025 - 01:45 PM

@ Auracomputer
 

I have merged your topic into the primary support topic for victims of this ransomware.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#20 Auracomputer

Auracomputer

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:07 AM

Posted 31 May 2025 - 12:34 AM

@ Auracomputer
 

I have merged your topic into the primary support topic for victims of this ransomware.

Thank you so much. I apologize for making a different post I just didn't know what type of ransomware has infected my computer. So apologies on my end.



#21 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:07 PM

Posted 31 May 2025 - 07:53 AM

You're welcome.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#22 PsuchO

PsuchO

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 22 July 2025 - 10:28 AM

Hi guys! Please help me to identify what ransomware has encrypted my files
All files has names like this

tb73.8382_front.psd.[ID-BAE12624][recovery-data09@protonmail.com].mz4

The "tb73.8382_front.psd" is an original file name.
If i open the psd file as txt i see this header "LockedByX77C"
And i also have a txt file with the following instructions
 

 

>>> ALL YOUR IMPORTANT FILES ARE STOLEN AND ENCRYPTED <<<

 
Important:
- We have downloaded your files. Your data will be leaked within the next 72 hours.
- Contact us immediately to prevent data leakage and recover your files.
 
Your Decryption ID: BAE12624
 
Contact:
- Email-1: recovery-data09@protonmail.com
- Email-2: Emilygoodgirl09@gmail.com
- Telegram: @Data_recovery09
 
Do not message data recovery companies, they will scam you.
If you have a data recovery palace, send a message to the email or Telegram ID.
 
If you don't message us within 72 hours and don't agree with us, we will leak all your files and publish them on famous sites!!
 
Warning:
- Tampering with files or using third-party tools WILL cause permanent damage.
- Act fast! The price will increase if you delay.
 
Free Decryption:
- Send 3 small files (max 1MB) for free decryption.

 

 



#23 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 649 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:07 AM

Posted 22 July 2025 - 11:47 AM

Hi guys! Please help me to identify what ransomware has encrypted my files
All files has names like this

tb73.8382_front.psd.[ID-BAE12624][recovery-data09@protonmail.com].mz4

The "tb73.8382_front.psd" is an original file name.
If i open the psd file as txt i see this header "LockedByX77C"
And i also have a txt file with the following instructions

It's C77L ransomware



#24 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:07 PM

Posted 22 July 2025 - 05:23 PM

@PsuchO
 
I have split away (merged) your posting and related comments into the primary support topic for victims of this ransomware.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#25 PsuchO

PsuchO

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 23 July 2025 - 02:28 AM

@PsuchO
 
I have split away (merged) your posting and related comments into the primary support topic for victims of this ransomware.

Yes, thanks

 

Hi guys! Please help me to identify what ransomware has encrypted my files
All files has names like this

tb73.8382_front.psd.[ID-BAE12624][recovery-data09@protonmail.com].mz4

The "tb73.8382_front.psd" is an original file name.
If i open the psd file as txt i see this header "LockedByX77C"
And i also have a txt file with the following instructions

It's C77L ransomware

 

Is that existing any solution? I need only recovery my PSD files


Edited by PsuchO, 23 July 2025 - 02:33 AM.


#26 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:07 PM

Posted 23 July 2025 - 07:03 PM

There is no known method that I am aware of to decrypt files. The encryption is secure and the criminal's master private key is needed for decryption. Without the master private key that can be used to decrypt your files, decryption is impossible. That usually means the key is unique (specific) for each victim and generated in a secure way (e.g. RSA, AES, Salsa20, ChaCha20, EDA2, ECDH, ECC, ECIES or combination of encryptions) that cannot be brute-forced.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#27 Olli325

Olli325

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:07 AM

Posted 17 August 2025 - 08:30 PM

Hello, i left my pc turned on deactivating bitlocker while i left with my family. When i returned like 6 hours later all icons were broken, thinking it was an error i restarted my pc and when several cmd windows appeared disconnected it from the internet. None of the files had their extensions changed, but all are encrypted.

I attach the #Restore-My-Files.txt file and several examples.

OS Windows 11 Pro

I have already tried with NO more ransom and id ransomware but didnt give me any result.

I just wanna know if those files can be decrypted and saved.

 

#Restore-My-Files.txt contents

>>> ALL YOUR IMPORTANT FILES ARE STOLEN AND ENCRYPTED <<<
 
Please note that only we are able to decrypt your data and anyone who claims on various platforms that they can decrypt your files is trying to scam you!
——————————————————
If we do not receive an email from you, we will leak all the information in global databases after 72 hours!!
So if you are an important organization that has committed a violation in your work and you do not want your information to be leaked, it is better to contact us.
 
- Contact us immediately to prevent data leakage and recover your files.
 
Your Decryption ID: 20BF7A67
 
#Write Decryption ID in subject 
 
Contact:
- Email-1: SuppDecFile@gmail.com
- Email-2: SuppDecFile@proton.me
——————————————————
No Response After 24 Hours: If you do not receive a reply from us within 24 hours,
please create a new, valid email address (e.g., from Gmail, Outlook, etc.), and send your message again using the new email address.
——————————————————
We can decrypt one or two small files for you so you can be sure we can decrypt them.

Attached Files



#28 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  •  Avatar image
  • Global Moderator
  • 65,330 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:07 PM

Posted 18 August 2025 - 05:51 AM

Using ID Ransomware was always more preferable than NoMoreRansom since it could identify ransomware which added a prefix instead of an extension and more accurately identified ransomware by filemarkers if applicable. However, neither ID Ransomware or NoMoreRansom are as accurate as they were in past years so both are prone to false identifications.
 
What extension was appended to your encrypted files?
 
This looks to be a variant of C77L/X77C Ransomware which will have an .[<email>].[random 8 hex char] or .[ID-random 8 hex char][<email>].[random 3 char] extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named #Recover-Files.txt, #Restore-My-Files.txt, READ-ME-Nullhexxx.txt as explained here by rivitna (Andrey Zhdanov). The [random 8 hex] character is the 32-bit serial number of volume C and crypto scheme is: AES-256 CBC - RSA-2048. These are examples.

.[nullhex@2mail.co].8AA60918
.[mrdarkness@onionmail.org].40D5BF0A 
.[ID-BAE12624][recovery-data09@protonmail.com].mz4

The name and contents of your ransom note are similar to what we have seen with other variants of this ransomware
 
C77L ransom notes are known to use a Decryption ID which is the same as the [random 8] (volume C serial number) included to the encrypted data file name.

\\\\ Your ID :  {8AA60918}
\\\\ Your ID :  {40D5BF0A}
Your Decryption ID: CE744A63
Your Decryption ID: BAE12624

Your ransom note includes a Decryption ID like those listed above.

 Your Decryption ID: 20BF7A67

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITEUnified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#29 Olli325

Olli325

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:07 AM

Posted 18 August 2025 - 09:26 AM

There are no changed sufix, except for one file that had the mail and serial of the disc and the extension .eig . Sorry for my ignorance, as i'm not informed on this situations, is there a way to decrypt it?



#30 Amigo-A

Amigo-A

    Security specialist and Ransomware expert. Volunteer Helper


  •  Avatar image
  • Members
  • 3,203 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:09:07 AM

Posted 18 August 2025 - 10:13 AM

Probably, this is, after all, C77L Ransomware


Edited by Amigo-A, 18 August 2025 - 10:16 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 





9 user(s) are reading this topic

0 members, 9 guests, 0 anonymous users