BOOT ransomware virus is a strain of DJVU malwareBeware of additional malware on your systemThreat SummaryRansomware distribution tacticsBOOT ransomware removal tips
The ransom note left by ransomware developers informs the user that all photos, databases, documents and other files have been encrypted, and the only way to restore them is to pay a ransom in Bitcoin. The criminals suggest sending some files to them to get them decrypted as a proof of the STOP/DJVU decryption tool’s functionality. There are two contact email addresses provided: gorentos@bitmessage.ch and gerentoshelp@firemail.cc. The cybercriminals state ransom price rules same as in previously distributed NESA ransomware variant:
If the victim pays within 72 hours after getting files encrypted with .boot file extensions, the ransom price is $490.If the victim fails to pay within 3 days, the ransom price doubles to $980.
The virus typically encrypts all files using ONLINE key (if it manages to connect to its command&control server). However, in some cases it might encrypt some files using OFFLINE key or a combination of both. Speaking of BOOT file decryption, it can be done only on files locked using OFFLINE key. You can also use your data backup to restore encrypted files. However, in case your personal ID ends with t1, there might be some hope to restore your files because it indicates that files were locked with an OFFLINE key. See the main article about DJVU for decryption details. In case your files were encrypted with ONLINE key, which is the most common way of encryption since each infected computer typically is connected to network – there are no BOOT decryption tools available. There are no options to recover .boot file extension data encrypted by the virus using Volume Shadow Copies – the virus deletes them using a command prompt. It also runs these commands to stop particular Windows services and disable recovery options. sc stop VVSsc stop wscsvcsc stop WinDefendsc stop wuauservsc stop BITSsc stop ERSvcsc stop WerSvccmd.exe /C bcdedit /set {default} recoveryenabled Nocmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet
Beware of additional malware on your system
The STOP ransomware (also known as DJVU) is known to distribute additional malware called Azorult password-stealing Trojan Several victims have already reported that the attackers managed to steal their passwords and use their financial data illegally. It is clear that if you want to avoid that, you must remove Boot ransomware virus along with all other threats from your PC immediately. Please follow the instructions given at the end of this article. After that, change all your important passwords (online shops you used recently, other accounts connected to your credit cards) IMMEDIATELY. Content of the ransom note (_readme.txt or _openme.txt) is shown below.
Threat Summary
Ransomware distribution tactics
Boot ransomware, as well as the whole STOP/DJVU virus variants are known to reach the targets via classic malware distribution channels, such as:
Malicious spam;Malicious links;Compromised ad networks;Compromised web pages.Illegal downloads.
Please be very careful when browsing online to avoid unexpected data loss. Cyber criminals are highly professional nowadays and they can obfuscate a malicious file almost without leaving no traces. Resist the temptation to open an interesting e-mail you received but never waited for – it is most likely a trap that will destroy all of your files. One wrong click on an email attachment or malicious link can turn all your files useless, so please be extremely attentive what you open when browsing the world wide web. We suggest reading these ransomware prevention guidelines.
BOOT ransomware removal tips
You must remove BOOT ransomware virus instantly due to the privacy hazards it causes. Some variants of this malware spreads along with Azorult data-stealing Trojan, so we strongly recommend using a robust malware cleaner – antivirus. Start Boot ransomware removal using the self-help guide given below. It is extremely important to use an up-to-date antivirus so that it could have this virus’ detection details. Once you get rid of the malware on your computer, start data recovery using a backup you have. If you don’t, there may be no ways to restore your files. If that’s the case, we still do not encourage you to pay the ransom – cyber criminals aren’t the ones to be trusted, so even after paying you might never get your files back. OUR GEEKS RECOMMEND Our team recommends a two-step rescue plan to remove ransomware and other remaining malware from your computer, plus repair caused virus damage to the system: GeeksAdvice.com editors select recommended products based on their effectiveness. We may earn a commission from affiliate links, at no additional cost to you. Learn more. Get INTEGO ANTIVIRUS for Windows to remove ransomware, Trojans, adware and other spyware and malware variants and protect your PC and network drives 24/7. This VB100-certified security software uses state-of-art technology to provide protection against ransomware, Zero-Day attacks and advanced threats, Intego Web Shield blocks dangerous websites, phishing attacks, malicious downloads and installation of potentially unwanted programs. Use INTEGO Antivirus to remove detected threats from your computer. Read full review here. RESTORO provides a free scan that helps to identify hardware, security and stability issues and presents a comprehensive report which can help you to locate and fix detected issues manually. It is a great PC repair software to use after you remove malware with professional antivirus. The full version of software will fix detected issues and repair virus damage caused to your Windows OS files automatically. RESTORO uses AVIRA scanning engine to detect existing spyware and malware. If any are found, the software will eliminate them. Read full review here.
Alternative software recommendations
Malwarebytes Anti-Malware
Method 1. Enter Safe Mode with Networking
Before you try to remove the virus, you must start your computer in Safe Mode with Networking. Below, we provide the easiest ways to boot PC in the said mode, but you can find additional ones in this in-depth tutorial on our website – How to Start Windows in Safe Mode. Also, see a video tutorial on how to do it: Instructions for Windows XP/Vista/7 users Instructions for Windows 8/8.1/10 users Now, you can search for and remove BOOT ransomware files. It is very hard to identify files and registry keys that belong to the ransomware virus, Besides, malware creators tend to rename and change them repeatedly. Therefore, the easiest way to uninstall such type of a computer virus is to use a reliable malware removal program. In addition, we suggest trying a combination of INTEGO Antivirus (removes malware and protects your PC in real-time) and RESTORO (repairs virus damage to Windows OS files).
Method 2. Use System Restore
In order to use System Restore, you must have a system restore point, created either manually or automatically. Instructions for Windows XP/Vista/7 users Instructions for Windows 8/8.1/10 users After restoring the system, we recommend scanning the system with antivirus or anti-malware software. In most cases, there won’t be any malware remains, but it never hurts to double-check. In addition, we highly recommend checking ransomware prevention guidelines provided by our experts in order to protect your PC against similar viruses in the future. Removing spyware and malware is one step towards cybersecurity. To protect yourself against ever-evolving threats, we strongly recommend purchasing a Premium version of Malwarebytes Anti-Malware, which provides security based on artificial intelligence and machine learning. Includes ransomware protection. See pricing options and protect yourself now.
System Mechanic Ultimate Defense If you’re looking for an all-in-one system maintenance suite that has 7 core components providing powerful real-time protection, on-demand malware removal, system optimization, data recovery, password manager, online privacy protection and secure driver wiping technology. Therefore, due to its wide-range of capabilities, System Mechanic Ultimate Defense deserves Geek’s Advice approval. Get it now for 50% off. You may also be interested in its full review.
Disclaimer. This site includes affiliate links. We may earn a small commission by recommending certain products, at no additional cost for you. We only choose quality software and services to recommend. This article was first published on September 29, 2019 and updated on October 3, 2019.