Yes, this is C77L Ransomware.
You will need AES session keys to decrypt your files.
Those files are encrypted with two AES keys
Posted 18 August 2025 - 02:48 PM
Yes, this is C77L Ransomware.
You will need AES session keys to decrypt your files.
Those files are encrypted with two AES keys
Posted 18 August 2025 - 04:25 PM
@Olli325
I have merged your topic into the primary support topic for victims of this ransomware.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 09 September 2025 - 03:08 PM
\\\\ All your files are encrypted...All your files have been encrypted !!!To decrypt them send e-mail to this address : mrdarkness@onionmail.orgIf you do not receive a response within 24 hours, Send a TOX messageTOX ID :B1AEB666CCE5D055BCF87D25DBACF8E82A0B69F5C605F2E133741147C9510908CD8C97DD36C0You can access it from here.INCASE OF NO PAYMENT IN 48 HOURS, THE PRICE WILL DOUBLE !!\\\\ Your ID : {40D5BF0A}Enter the ID of your files in the subject !\\\\ What is our decryption guarantee ?Before paying you can send us up to 2 test files for free decryption !The total size of files must be less than 2Mb.(non archived) !Files should not contain valuable information.(databases,backups) !Compress the file with zip or 7zip or rar compression programs and send it to us!
Posted 09 September 2025 - 03:17 PM
@chzaza
I have merged your topic into the primary support topic for victims of this ransomware.
The contents of your ransom note are similar to what we have seen with other variants of this ransomware
C77L ransom notes are known to use a Decryption ID which is the same as the [random 8] (volume C serial number) included to the encrypted data file name.
\\\\ Your ID : {8AA60918}
Your Decryption ID: CE744A63
Your Decryption ID: BAE12624
Your Decryption ID: 80587FD8
Your ransom note includes a Decryption ID like those listed above.
\\\\ Your ID : {40D5BF0A}
mrdarkness@onionmail.org is on the C77L/X77C Ransomware Attackers Email List
The encryption is secure and the criminal's master private key is needed for decryption. Without the criminal's master private key, decryption is impossible. For now all you can do is backup/save your encrypted data as is and wait for a possible solution at a later time.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 09 September 2025 - 03:35 PM
Posted 09 September 2025 - 04:03 PM
You're welcome.
When or if a free (or legitimate paid for) decryption solution is found, that information will be provided in this support topic and victims will receive notification,
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 23 September 2025 - 07:45 PM
New variant reported with .3yk extension (#Restore-My-Files.txt)
.[ID-80587FD8][Dm_for_decrypt@protonmail.com].3yk
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 24 September 2025 - 10:42 AM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 06 October 2025 - 10:17 AM
Looks like I have been gotten. Not sure how it got in but it did a number on my system.
I think its Proton and the hacker did send back 3 files that they decrypted. Now my system has had all of the exe's changed and I have to totally wipe and bring back up. I have lost some stuff but have a good amount of backup so, I am comfortable with that. If I understand correctly, there is no tool to handle decryption yet?
ransom note contents:
>>> ALL YOUR IMPORTANT FILES ARE STOLEN AND ENCRYPTED <<<
Important:
- We have downloaded your files. Your data will be leaked within the next 72 hours.
- Contact us immediately to prevent data leakage and recover your files.
Your Decryption ID: 9A7BE444
Contact:
- Email-1: Decryptorkrypt@gmail.com
- Email-2: Saveyourdata@tutamail.com
Warning:
- Tampering with files or using third-party tools WILL cause permanent damage.
- Act fast! The price will increase if you delay.
Free Decryption:
- Send 3 small files (max 1MB) for free decryption.
<The test file is your right. And never pay without it because you must first make sure the tool works.>
Posted 06 October 2025 - 10:29 AM
@tcv212121
You are not dealing with Proton/Shinra.
Your screenshot shows the below extension.
.[ID-9A7BE444][Decryptorkrypt@gmail.com].nb0
The file format looks like a new variant of C77L/X77C Ransomware most of which will have an .[<email>].[random 8 hex char] or .[ID-random 8 hex char][<email>].[random 3 char] extension appended to the end of the encrypted data filename
.[ID-BAE12624][recovery-data09@protonmail.com].mz4 .[ID-80587FD8][Dm_for_decrypt@protonmail.com].3yk
C77L leave files (ransom notes) named #Recover-Files.txt, #Restore-My-Files.txt, READ-ME.txt, READ-ME-Nullhexxx.txt. The contents of your ransom note are similar to what we have seen with other variants of this ransomware
However, these two emails are on both the C77L/X77C Ransomware Attackers Email List and Proton/Shinra Attackers Email List
- Email-1: Decryptorkrypt@gmail.com - Email-2: Saveyourdata@tutamail.com
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 06 October 2025 - 10:43 AM
Thank you so very much. Do you know if there is a tool to help get these back?
Posted 06 October 2025 - 02:40 PM
@tcv212121
I have split away (merged) your posting and related comments into the primary support topic for victims of this ransomware.
The encryption is secure and the criminal's master private keys (AES session key) are needed for decryption. Without the criminal's master private key (session key)s, decryption is impossible. That usually means the key is unique (specific) for each victim and generated in a secure way (e.g. RSA, AES, Salsa20, ChaCha20, EDA2, ECDH, ECC, ECIES or combination of encryptions) that cannot be brute-forced...the public key alone that encrypted files is useless for decryption. In your case, the criminal's AES session keys are needed to decrypt files.
For now all you can do is backup/save your encrypted data as is and wait for a possible solution at a later time.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 13 October 2025 - 03:27 AM
Need Help. ID Ransomware can not identify. All files jn NAS dont open.
0 members, 9 guests, 0 anonymous users