How to Remove Apocalypse Ransomware
What is Apocalypse?
Apocalypse ransomware is a computer virus that encrypts personal files, downloads a ransom note on the computer, and demands a ransom payment in order to decrypt files.
Table of Contents
Overview
Name | Distribution |
---|---|
Apocalypse virus, Apocalypse ransomware | Email, Exploit Kit, Social Media |
Apocalypse has been around for quite some time and has an infamous history among the malware research community due to the malware author’s antics with a researcher who continuously cracks his malware. The ransomware is like most ransomware in the way it is distributed. It is predominantly distributed by malicious email messages that contain malicious links and attachments. The email attachments will usually be a .zip file or fake Microsoft Word document file. If contents from the .zip file are manually extracted it will unpack another file that is usually a JavaScript file, JScript Encoded file, or VBScript Script file. When the file is manually executed by the user it will cause the malware to spread across the machine and begin the file encryption process.
Targeted File Extensions
.mid, .wma, .flv, .mkv, .mov, .avi, .asf, .mpeg, .vob, .mpg, .wmv, .fla, .swf, .wav, .qcow2, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .tar.bz2, .tbk, .bak, .tar, .tgz, .rar, .zip, .djv, .djvu, .svg, .bmp, .png, .gif, .raw, .cgm, .jpeg, .jpg, .tif, .tiff, .NEF, .psd, .cmd, .bat, .class, .jar, .java, .asp, .brd, .sch, .dch, .dip, .vbs, .asm, .pas, .cpp, .php, .ldf, .mdf, .ibd, .MYI, .MYD, .frm, .odb, .dbf, .mdb, .sql, .SQLITEDB, .SQLITE3, .asc, .lay6, .lay, .ms11 (Security copy), .sldm, .sldx, .ppsm, .ppsx, .ppam, .docb, .mml, .sxm, .otg, .odg, .uop, .potx, .potm, .pptx, .pptm, .std, .sxd, .pot, .pps, .sti, .sxi, .otp, .odp, .wks, .xltx, .xltm, .xlsx, .xlsm, .xlsb, .slk, .xlw, .xlt, .xlm, .xlc, .dif, .stc, .sxc, .ots, .ods, .hwp, .dotm, .dotx, .docm, .docx, .DOT, .max, .xml, .txt, .CSV, .uot, .RTF, .pdf, .XLS, .PPT, .stw, .sxw, .ott, .odt, .DOC, .pem, .csr, .crt, .key, wallet.dat
Apocalypse ransomware encrypts files that match certain file extensions with RSA and AES ciphers. Once the encryption process is complete it will render the files inaccessible to the user. The encrypted files are appended a new file extension at the end of the file name and given a new file type. The file name will become randomized or given a pattern such as [unique_id][identifier].File_Extension. A ransom note (or series of ransom notes) in .html and text formats will be placed in every folder the virus encrypted files in and on Windows desktop. In addition, Windows desktop might also change to an image of the ransom note and an image file of the ransom note will also be left in every folder the virus encrypted files in.
Screenshot
To further complications, a lock-screen may also be used to restrict access to the infected machine. A lock-screen is typically used to display a message from the malware author or distributor to the victim. The lock-screen acts as a ransom note or deceptive entity and contains steps to make a payment.
It is suggested to avoid paying ransomware authors to decrypt your files. Luckily, this ransomware has free removal and decryption programs listed below. Third-party programs Shadow Explorer, PhotoRec, or Recuva can also be used to potentially recover files encrypted by this virus. A user may also be able to retrieve encrypted files by performing a system restore to a date and time before the infection occurred.
Removal Software
Name | Detection | Download |
---|---|---|
Malwarebytes Anti-Malware Premium | Ransomware.Apocalypse | Buy |
Malwarebytes Anti-Malware Free | Ransomware.Apocalypse | Download (Free) |
HitmanPro by Surfright | Ransomware.Apocalypse | Download (Free) |
View more: Antivirus Software, Antimalware Software, Optimization and Cleaning Software
Decryption Software
Decryption Software |
File Recovery Software
Name | Description | Download |
---|---|---|
Shadow Explorer | Restores lost or damaged files from Shadow Copies | Download (Free) |
Photorec | Recovers lost files | Download (Free) |
Recuva | Recovers lost files | Download (Free) | Buy |
Troubleshoot
Alternative methods are suggested if there are issues removing Apocalypse ransomware from an infected computer.
How to Restore your computer
If a restore point has previously been established on your machine you will be able to perform a system restore in order to restore your machine to a date and time before it was infected. You will lose files on your computer that were obtained prior to the restore point.
There are several options to restore your computer. Most computers have their own restore software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default restore program that can also be found by performing a search.
A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.
How to Recover your computer to factory settings
A system recovery (or reset) will recover your computer to factory settings. You will lose the current programs and files on your computer.
There are several options to recover your computer to factory settings. Most computers have their own recovery software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default recovery program that can also be found by performing a search.
A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.