Information about Gpcode.ak virus

Detection date: July 4, 2008
Danger: virus

Specifications

This Gpcode.ak malicious program will encrypt the files on the infected computer. This is a Windows PE EXE file with size 8030 bytes.

How it works

When launched, this virus will create the following mutex in memory to mark its presence in the system: _G_P_C_. (Mutex is a programming flag still used to retrieve and issue an object).

Then it will start scanning all logical disks to encrypt files in it. Encrypting all user files with extensions is listed in the following table:

7z

abk

abd

acad

arh

arj

ace

arx

asm

bz

bz2

bak

bcb

c

cc

cdb

cdw

cdr

cer

cgi

chm

cnt

cpp

css

csv

db

db1

db2

db3

db4

dba

dbb

dbc

dbd

dbe

dbf

dbt

dbm

dbo

dbq

dbx

Djvu

doc

dok

dpr

dwg

dxf

ebd

eml

eni

ert

fax

flb

frm

frt

frx

frg

gtd

gz

gzip

gfa

gfr

gfd

hour

inc

igs

iges

jar

jad

Java

jpg

jpeg

Jfif

jpe

js

jsp

hpp

htm

html

key

kwm

Ldif

lst

lsp

lzh

lzw

ldr

man

mdb

mht

mmf

mns

mnb

mnu

mo

msb

msg

mxl

old

p12

pak

pas

pdf

pem

pfx

php

php3

php4

pl

prf

pgp

prx

pst

pw

pwa

pwl

pwm

pm3

pm4

pm5

pm6

rar

rmr

rnd

rtf

Safe

sar

sig

sql

tar

tbb

tbk

tdf

tgz

txt

uue

vb

vcf

wab

xls

xml

This virus uses Microsoft Enhanced Cryptographic Provider v1.0 (included in Windows) to encrypt files. Files are encrypted using RC4 algorithm. The encryption key is then encrypted using an RSA public key with a 1024-bit length in the body of the virus.

RSA encryption algorithm divides the encryption keys into two types public and private. Only public keys are needed to encrypt messages. An encrypted message can only be decrypted with the private key.

The virus will create an encrypted copy for each original file. The encrypted copy will retain the original file name with the _CRYPT section added to the end of the file name. For example:

WaterLilles.jpg —file original

WaterLilles.jpg._CRYPT —file encrypted

The original file will then be deleted.

The virus leaves a file named "! _READ_ME _ !. txt" in each folder containing encrypted files. This file contains the following:

Your files are encrypted with RSA-1024 algorithm.
Để phục hồi tập tin bạn cần phải làm việc our decryptor.
To buy decrypting tool contact us at: [censored] @ yahoo.com

=== BEGIN ===
[key]
=== END ===

Files located in the Program Files folder and the following files will not be encrypted:

There are "system" and "hidden" properties;

Less than 10 bytes

Greater than 734003200 bytes

Once the virus has been activated, it will create a VBS file to delete the main body of the virus itself in the victim computer and create a MessageBox shown below on the screen:

Information about Gpcode.ak virus Picture 1

The virus does not register itself in the system registry.

Instructions to overcome

File recovery

At this point, it is not possible to decrypt files encrypted by Gpcode. However, you can still use PhotoRec to recover the original files deleted by Gpcode after the virus has created an encrypted version of the files.

This utility is used to recover Microsoft Office documents, executable files, PDF and TXT documents, . This is a list of supported file formats.

PhotoRec is part of TestDisk. The latest version of TestDisk, like PhotoRec, can be found here.

Below are detailed instructions on how to recover deleted files with PhotoRec:

  1. Use another clean computer to download TestDisk, including PhotoRec.
  2. Save PhotoRec to an external drive and connect this drive to the infected computer (Gpcode.ak cannot infect and delete itself after launching).
  3. Run PhotoRec ( photorec_win.exe file and located in the win folder of TestDisk):

Information about Gpcode.ak virus Picture 2

  1. Select the target drive for PhotoRec to search for files and press ENTER to continue:

Information about Gpcode.ak virus Picture 3

If you have multiple drives in the system, perform this step for each drive (ie when recovering files from a drive, you must repeat the same process for the next drive).

  1. Select the partition table type (typically 'Intel') and press ENTER to continue.

Information about Gpcode.ak virus Picture 4

  1. Select the partition you want to restore files and press ENTER to continue.

Information about Gpcode.ak virus Picture 5

If the disk has several partitions, then you need to repeat this step for each partition.

  1. Select the file system type (for Windows users should choose 'Other') and press ENTER to continue.

Information about Gpcode.ak virus Picture 6

  1. Select the location to search for deleted files and press ENTER to continue. Select 'Whole' to search the entire drive to find deleted files.

Information about Gpcode.ak virus Picture 7

  1. PhotoRec will ask you to specify a destination folder for restored files. Use PhotoRec's file browser to move the root directory (by selecting "." and pressing ENTER)

The root directory will show which drives the system has. Select the appropriate removable (or network) drive and the folder in which you want to save the restored files. Should choose an external drive, that is, do not select the drive on the infected device because the deleted files may be corrupted.

Before recovering files, create a separate folder on the drive (eg "recovered") and choose to save the restored files to this directory, to avoid errors that occur after recovery. When you have selected the folder, press "Y".

Information about Gpcode.ak virus Picture 8

When you press "Y", you will see a file recovery process appear. This process takes a little time to implement.

Information about Gpcode.ak virus Picture 9

Please wait for the process to finish before proceeding to the next step.

  1. The recovered files are now in your external drive. When you open the folder containing the restored files, you will see the file name does not correspond to the original file name in the old hard drive.

Your file names will look like the following:

Information about Gpcode.ak virus Picture 10

This is because of PhotoRec's way of working, you should not be alarmed when you encounter this situation. In addition, although the utility can recover the contents of the files, it still cannot establish their original location.

To complete the recovery process, we create a free utility called StopGpcode to classify and rename the restored files.

  1. On another computer, download the Stopgpcode utility and copy it to the USB drive.
  2. Plug this USB drive into the infected computer and load the Windows Command Prompt by going to START | PROGRAMS | ACCESSORIES .
  3. Select the USB drive by typing that drive letter, for example, W: for example.
  4. Then run the utility from the command line by typing the following command:
    STOPGPCODE -r -i -o
    eg: STOPGPCODE -r W: RECOVERED -i С: -o W: SORTED

Information about Gpcode.ak virus Picture 11

The utility will process the entire disk and compare the size of the encrypted and restored files. The program will use the file size to detect the original location and the name of the restored file.

The utility will detect the correct name and location of each file, recreate the root directory and file names within the directory. If the utility cannot specify the original file name, the file will be saved to a folder named "conflicted".

Information about Gpcode.ak virus Picture 12

You can download Stopgpcode here.

Decrypt files with StopGpcode2

Some files encrypted by Gpcode.ak can be decrypted without using the RSA private key. They can be decoded by the steps below:

  1. Find all encrypted files with the ._CRYPT extension from the victim computer and copy them to a removable storage device in a folder named encrypted .
  2. Follow the commands in 'Restoring Files' and save the restored file with the correct restored names to the removable drive in the folder named 'backup'.
  3. Match unencrypted copies of files with encrypted versions in the 'encrypted' folder. You can find unencrypted versions of files in your backup. If you lose the image, you may have a copy left on the camera's memory card. Often you can get copies for encrypted files on network resources. There are files you need to search and copy to the folder named 'backup'.

Note: You must ensure that files saved to the backup folder must have a different name in the 'encrypted' folder - everything needs to be distinguished except the extension ._CRYPT.

  1. Create a folder named 'decrypted' where you will save the decrypted file. Download the Stopgpcode2 tool that can help you decrypt these files.
  2. Launch StopGpcode2 from the command prompt ( Start > Run > cmd.exe ) - make sure the full path for the folders 'encrypted', 'backup' and 'decrypted'. For example, if the tool and the directories are in the root directory of drive E: then you need to execute the following:

    e: stopgpcode2.exe e: encrypted e: backup e: decrypted

When the program executes, you will see the tool start decrypting your files.

Information about Gpcode.ak virus Picture 13

  1. After completing the decryption, it will display a message that has completed 'Done'. You can now open the 'decrypted' folder and check which files the tool can decrypt.

Information about Gpcode.ak virus Picture 14

L prefers: The tool may not be able to decrypt all files. In this case, it will notify you of the problem.

In addition, you should not test the tool on a virtual machine. The results obtained on the virtual machine will be much different than on real machines.

4 ★ | 3 Vote

May be interested

  • In June, 27 new viruses appeared in VietnamIn June, 27 new viruses appeared in Vietnam
    the 27 new viruses, including the first two rootkit installation viruses in vietnam, are general information about the virus situation in june. the above information is available from the network security center (bkis). hanoi university of science and technology
  • Destroy the autorun virus in USB or on PC with 4 simple waysDestroy the autorun virus in USB or on PC with 4 simple ways
    because windows will perform these autorun.inf files first, some hackers take advantage of this to install the virus into the autorun file so that it can spread the virus easily to the entire system. this article will show you how to remove autorun virus from usb or pc.
  • Virus encrypts victim's computer data for ransomVirus encrypts victim's computer data for ransom
    the uk crime prevention agency (nca) in november issued a warning about a virus that is spreading very fast online via email, called crytolocker.
  • Rumors regarding the new Corona virus (2019-nCoV) and WHO answersRumors regarding the new Corona virus (2019-nCoV) and WHO answers
    here are answers to questions about the new corona virus (2019-ncov) of who invite you to refer to better understand it, thereby taking the most effective preventive measures for yourself and your family.
  • Skype is being attacked by Dorkbot wormSkype is being attacked by Dorkbot worm
    skype is not completely immune to malware and spam. therefore, users should be more cautious if they intend to click on random links that are sent to their account via this service.
  • How to fix when Facebook is infected with virusHow to fix when Facebook is infected with virus
    facebook is infected with a virus that no user wants. with 9 basic steps in the following article of network administrator, you will be able to recover your facebook account and 'clean up' the obnoxious virus.
  • 17 clear signs that your computer has been attacked by a virus17 clear signs that your computer has been attacked by a virus
    most users have the same opinion that they have installed anti-virus programs and software on their computers, so viruses can hardly attack their computers. however this is a wrong view. viruses are increasingly sophisticated, and they can invade and attack users' computers in many different ways.
  • Steps to root Win32 virus: ExpiroSteps to root Win32 virus: Expiro
    virus: win32 / expiro.gen is a quite dangerous virus that annoys users by affecting all executable files (.exe files). once virus virus: win32 / expiro.gen attacks your system, it can collect data on your computer and provide your computer access to unwanted users.
  • Virus attacks Mac OS X operating systemVirus attacks Mac OS X operating system
    last week, security firm symantec warned of a virus that could spread on the mac os x platform. although the virus is not very dangerous, it raises a warning that there is no system. any action is not infected by the virus
  • 3 things that antivirus software can't do3 things that antivirus software can't do
    installing and updating antivirus software is extremely important. young internet users will not be able to know the time when there is no anti-virus software and the constant threat of malware and phishing attacks always make people nervous and forced to find ways. to protect your documents and information. there are many antivirus programs available to help protect your system.