Meteoritian Ransomware Removal and Decryption Guide

Details About Meteoritan Ransomware Infection

Meteoritan Ransomware is a newly discovered scareware type of malware. Viruses such as this one post as dangerous to the computer and appear to use an advanced encryption cipher. In reality, they either do not encrypt (but merely rename) the target user data or only display a ransomware note which is identical to those that we have seen in real strains. In the last few years we have witnessed two distinct types of scareware viruses which can be categorized as the following:

1. Impersonator Strains –The viruses impersonate well-known malware families by adopting their ransomware note and can even rename the affected data with the same extensions.
2. Independent Strains – These strains are created as single binaries that utilize their own identity by creating custom ransomware notes, extensions (if any) and vectors of infection.

All scareware mimic the behavior patterns of the common malware threats, and the Meteoritan ransomware is no different. Upon infection with it two distinct files (where_are_your_files.txt and readme_your_files_have_been_encrypted.txt) are crafted on the victim’s computer. Depending on the individual strain and the predefined customization the engine may also rename target user data with a specific extension. At this moment the initial security analysis does not indicate that such features exist. The files contain a ransomware note which has the following contents:

ATTENTION! ATTENTION! You have been victim of METEORITAN RAMSOMWARE!
Your documents, photos, databases and other important files have been encrypted by RSA-4096 alghorythm generated by your computer, if you want to restore your files, you must get a decryption key.
How can I get decrypt key?
1. Send E-Mail to [email protected] with your ID. Your ID is in METEORITAN.POLAND file, open in Notepad.
2. Get Bitcoins. Bitcoin is a cryptovalute, which can pay. Use these sites: coinbase.com, btc.com, bitgo.com, strongcoin.com
3. In e-mail turning, we get a value of your key. Pay it.
4. In 24 hours you get an decrypt key. If you don’t see e-mail, check spam catalogue.
5. Run aplication and enter your key.
METEORITAN RAMSOMWARE

From the provided information we can conclude the following:

  • The creators of the virus use a freely hosted email solution. Yandex is one of the most popular providers employed by Russian-speaking users who may indicate that the criminal(s) behind the scareware are located in a country where the language is spoken.
  • The virus has crafted a particular file (METEORITAN.POLAND) which contains a custom infection ID. This means that the engine has the capability of creating one for the target host. This may be based on a combination of system information variables or another type of input data.
  • The hackers do not specify an exact ransomware sum. This indicates that they may change the fee depending on the amount and “sensitivity” of the files stored on the computer.
  • A time limit is imposed upon the victims who may increase the payment ratio.

It’s important to note that the detected samples so far feature an early version of the threat. Future evolved versions of it may add malicious functions that may include one of the following:

  • Payload Dropper – The virus may be used to infect the machine with additional viruses such as banking Trojans.
  • Information Harvesting – Advanced engines can extract sensitive system information or data which can be abused further by the hacker operators.
  • Persistence – The modification of registry entries, system settings, and boot options can make manual removal impossible. When the virus has taken control over the environment, only a quality anti-malware solution can effectively clean the computer from the infection.

Ransomware Spread Techniques

The ransomware payloads may be distributed via malvertising campaigns. The ads are possible to be displayed on legitimate websites who have poor security configuration. Banners, pop-ups, links, videos and other varieties of online ad formats may be hiding the potential risk of Meteoritian ransomware infection. The infection could be triggered via a drive-by download attack technique. So once you click on the ad, it could land you on a corrupted web page with injected malware code.

Spam email campaigns are yet another mean of ransomware distribution. The emails usually contain a link or an attachment supported by text that urges you to interact with the presented content. A link could again land you on a compromised web page. Then the download process of Meteoritian payloads starts unnoticeably. An attachment may contain a file that contains malicious code. When you download the file and open it, the ransomware infection starts and corrupts all important files.

Remove Meteoritian Ransomware and Decrypt Files

For the sake of your security, it’s better to avoid any negotiations with the criminals. However, there is no doubt that you should remove Meteoritian ransomware from the infected computer in order to continue its regular usage. If you skip the removal step, the malicious payloads of Meteoritian will be running on your system each time you start the PC. Thus all of your new files that are among Meteoritian target list will also be encrypted. Below you could find detailed removal guide and choose your way to remove the ransomware completely.

We also recommend you to make copies of all encrypted files and store them in a backup before you make any attempts to restore your data. So you can save them until a working decryption solution is available.

Summary of Meteoritian Ransomware

 


Name
Meteoritian Ransomware

File Extension
Unknown

Ransom
Varies

Easy Solution
You can skip all steps and remove Meteoritian ransomware with the help of an anti-malware tool.

Manual Solution
Meteoritian ransomware can be removed manually, though it can be very hard for most home users. See the detailed tutorial below.

Distribution
Spam emails, malicious URLs, malicious attacments, exploit kits, freeware.

Meteoritian Ransomware Removal

STEP I: Start the PC in Safe Mode with Network
This will isolate all files and objects created by the ransomware so they will be removed efficiently.

    1) Hit WIN Key + R

Windows-key-plus-R-button-launch-Run-Box-in-Windows-illustrated

    2) A Run window will appear. In it, write “msconfig” and then press Enter
    3) A Configuration box shall appear. In it Choose the tab named “Boot
    4) Mark “Safe Boot” option and then go to “Network” under it to tick it too
    5) Apply -> OK

Or check our video guide – “How to start PC in Safe Mode with Networking

STEP II: Show Hidden Files

    1) Open My Computer/This PC
    2) Windows 7

      – Click on “Organize” button
      – Select “Folder and search options
      – Select the “View” tab
      – Go under “Hidden files and folders” and mark “Show hidden files and folders” option

    3) Windows 8/ 10

      – Open “View” tab
      – Mark “Hidden items” option

    show-hidden-files-win8-10

    4) Click “Apply” and then “OK” button

STEP III: Enter Windows Task Manager and Stop Malicious Processes

    1) Hit the following key combination: CTRL+SHIFT+ESC
    2) Get over to “Processes
    3) When you find suspicious process right click on it and select “Open File Location
    4) Go back to Task Manager and end the malicious process. Right click on it again and choose “End Process
    5) Next you should go folder where the malicious file is located and delete it

STEP IV: Remove Completely Meteoritian Ransomware Using SpyHunter Anti-Malware Tool

Manual removal of Meteoritian requires being familiar with system files and registries. Removal of any important data can lead to permanent system damage. Prevent this troublesome effect – delete Meteoritian ransomware with SpyHunter malware removal tool.

SpyHunter anti-malware tool will diagnose all current threats on the computer. By purchasing the full version, you will be able to remove all malware threats instantly. Additional information about SpyHunter / Help to uninstall SpyHunter

STEP V: Repair Windows Registry

    1) Again type simultaneously the Windows Button + R key combination
    2) In the box, write “regedit”(without the inverted commas) and hit Enter
    3) Type the CTRL+F and then write the malicious name in the search type field to locate the malicious executable
    4) In case you have discovered registry keys and values related to the name, you should delete them, but be careful not to delete legitimate keys

Further help for Windows Registry repair

STEP VI: Recover Encrypted Files

    1) Use present backups
    2) Use professional data recovery software

      Stellar Phoenix Data Recovery – a specialist tool that can restore partitions, data, documents, photos, and 300 more file types lost during various types of incidents and corruption.
    3) Using System Restore Point

      – Hit WIN Key
      – Select “Open System Restore” and follow the steps


restore-files-using-system-restore-point

    4) Restore your personal files using File History

      – Hit WIN Key
      – Type “restore your files” in the search box
      – Select “Restore your files with File History
      – Choose a folder or type the name of the file in the search bar

    restore-your-personal-files-using-File-History-bestecuritysearch

      – Hit the “Restore” button

STEP VII: Preventive Security Measures

    1) Enable and properly configure your Firewall.
    2) Install and maintain reliable anti-malware software.
    3) Secure your web browser.
    4) Check regularly for available software updates and apply them.
    5) Disable macros in Office documents.
    6) Use strong passwords.
    7) Don’t open attachments or click on links unless you’re certain they’re safe.
    8) Backup regularly your data.

SpyHunter anti-malware tool will diagnose all current threats on the computer. By purchasing the full version, you will be able to remove all malware threats instantly. Additional information about SpyHunter / Help to uninstall SpyHunter

How disturbing is this problem?

Gergana Ivanova

Author : Gergana Ivanova

Gergana Ivanova is computer security enthusiast who enjoys presenting the latest issues related to cyber security.


Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *