How to Remove GoldenEye Ransomware
What is GoldenEye Ransomware?
GoldenEye ransomware is a computer virus that encrypts files, randomizes file names, adds a new file extension, and reboots the computer to a boot-level ransom note in yellow text.
Table of Contents
Overview
Names | Distribution |
---|---|
GoldenEye, GoldenEye virus, GoldenEye ransomware, Peyta (Variant) | Email, Social Media |
GoldenEye ransomware is predominantly distributed by malicious email attachments that employ deceptive methods. The email attachment will typically consist of a.zip file or fake document file. If files from the .zip file are manually extracted it will unpack a JavaScript file. When the JavaScript file is manually executed by the user it will cause the malware to spread across the machine.
Targeted File Extensions
.mid, .wma, .flv, .mkv, .mov, .avi, .asf, .mpeg, .vob, .mpg, .wmv, .fla, .swf, .wav, .qcow2, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .tar.bz2, .tbk, .bak, .tar, .tgz, .rar, .zip, .djv, .djvu, .svg, .bmp, .png, .gif, .raw, .cgm, .jpeg, .jpg, .tif, .tiff, .NEF, .psd, .cmd, .bat, .class, .jar, .java, .asp, .brd, .sch, .dch, .dip, .vbs, .asm, .pas, .cpp, .php, .ldf, .mdf, .ibd, .MYI, .MYD, .frm, .odb, .dbf, .mdb, .sql, .SQLITEDB, .SQLITE3, .asc, .lay6, .lay, .ms11 (Security copy), .sldm, .sldx, .ppsm, .ppsx, .ppam, .docb, .mml, .sxm, .otg, .odg, .uop, .potx, .potm, .pptx, .pptm, .std, .sxd, .pot, .pps, .sti, .sxi, .otp, .odp, .wks, .xltx, .xltm, .xlsx, .xlsm, .xlsb, .slk, .xlw, .xlt, .xlm, .xlc, .dif, .stc, .sxc, .ots, .ods, .hwp, .dotm, .dotx, .docm, .docx, .DOT, .max, .xml, .txt, .CSV, .uot, .RTF, .pdf, .XLS, .PPT, .stw, .sxw, .ott, .odt, .DOC, .pem, .csr, .crt, .key, wallet.dat
GoldenEye ransomware encrypts files that match certain file extensions with encryption ciphers. The encryption process will render the files inaccessible to the user. The encrypted files are appended a new 8 character file extension to the end of the file and file type by the ransomware. A ransom note (or series of ransom notes) named YOUR_FILES_ARE_ENCRYPTED.TXT will then be placed in every folder the virus encrypted files in and on Windows desktop. In addition, the ransomware will modify the user’s MBR (Master Boot Record) with a custom boot loader.
The boot loader will forcibly restart the user’s computer and enters a stage where it proceeds encrypting the user’s hard drive MFT (Master File Table), which makes it impossible to access any files on the hard disk. During the process a fake chkdsk screen will be displayed.
Screenshots
Ransom Note Example
fff
The ransom note left on the computer by this ransomware contains information about what happened to the files, links to pages on Wikipedia, and steps to download and install Tor Browser in order to visit a web address and pay a ransom.
It is suggested to avoid paying ransomware authors to decrypt your files. Instead, third-party programs Shadow Explorer, PhotoRec, or Recuva can be used to potentially recover files encrypted by this virus. A user may also be able to retrieve encrypted files by performing a system restore to a date and time before the infection occurred.
Removal Software
Publisher | Detection | Download |
---|---|---|
Malwarebytes | Ransomware.GoldenEye | Download (Free) | Buy |
HitmanPro by Surfright | Ransomware | Download (Free) |
Decryption Software
Decryption Software |
File Recovery Software
Name | Description | Download |
---|---|---|
Shadow Explorer | Restores lost or damaged files from Shadow Copies | Download (Free) |
Photorec | Recovers lost files | Download (Free) |
Recuva | Recovers lost files | Download (Free) | Buy |
Troubleshoot
Alternative methods are suggested if there are issues removing GoldenEye ransomware from an infected computer.
How to Restore your computer
If a restore point has previously been established on your machine you will be able to perform a system restore in order to restore your machine to a date and time before it was infected. You will lose files on your computer that were obtained prior to the restore point.
There are several options to restore your computer. Most computers have their own restore software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default restore program that can also be found by performing a search.
A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.
How to Recover your computer to factory settings
A system recovery (or reset) will recover your computer to factory settings. You will lose the current programs and files on your computer.
There are several options to recover your computer to factory settings. Most computers have their own recovery software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default recovery program that can also be found by performing a search.
A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.