Severity scale:  
  (98/100)

Creeper ransomware. How to remove? (Uninstall guide)

removal by Ugnius Kiguolis - - | Type: Ransomware

Creeper ransomware – dangerous cryptovirus that demands a ransom in Monero

A printscreen of Creeper ransom note
Creeper ransomware - malicious cryptovirus which is still actively infecting PC users with new versions. The latest appeared on August 2018.

Creeper ransomware is a file-encrypting cyber infection, which seeks to lock personal files on victim's PC using a sophisticated AES encryption algorithm[1] and then appending .creeper or .crypton file extension. The ransom note used to demand a ransom for a personal decryption key is called either DECRIPT_MY_FILES.txt or DECRIPT_FILES.txt.The distinguishing mark of the virus is a skgrhk2018@tutanota.com email address used to contact the developers of this virus.

Name Creeper ransomware
Type Cryptovirus
Ransom note DECRIPT_MY_FILES.txt; DECRIPT_FILES.txt
File extension .creeper; .crypton
Email address skgrhk2018@tutanota.com
Ransom currency Monero 
Elimination Get rid of Creeper virus by running a full system scan with Reimage

Typically, hackers are requesting to send them a unique code that is indicated on a ransom note. The ransom message displayed by Creeper ransomware reads the following:

Decrypting your files is easy. Take a deep breath and follow the steps below.
1 ) Make the proper payment.
Payments are made in Monero. This is a crypto-currency, like bitcoin.
You can buy Monero, and send it, from the same places you can any other
crypto-currency. If you're still unsure, google 'monero exchange.'
Sign up at one of these exchange sites and send the payment to the address below.
Payment Address (Monero Wallet):
46WDbj1YCQrCfAGW37AJi3Ljr86waWBP1GwoRCeAGcR49xtNvRWpVyXQsqWDxW4qaQ5SxnDB4VnJZRhNaYHuvkAdVaeLeMM
2 ) Farther you should send the following code: *** to email address skgrhk2018@tutanota.com.
Then you will receive all necessary key.
Prices :
Days : Monero : Offer Expires
0-2 : 3 : 03/01/18
3-5 : 5 : 03/04/18
Note: In 6 days your password decryption key gets permanently deleted.
You then have no way to ever retrieve your files. So pay now.

In the text file, the ransomware does not indicate the particular amount of the ransom. The size of the redemption depends on how fast the victim reacts to the current situation. If the victim contacts the developers of the Creeper virus in two days or less, he or she will be asked to pay 3 Monero[2] coins, which is currently more than 800 USD. The price for those who respond within 3-5 days increases to 5 Monero coins, while the absolute deadline is six days. According to crooks, in 6 days the Creeper decryptor is permanently deleted.

All information related to this virus is originally written in English, so experts speculate that it's oriented to English-speaking users. Since English is a universal language, the prevalence of this crypto-extortionists is expected to be large.

Despite the fact that this file-encrypting virus is not yet decryptable, we strongly encourage you to remove Creeper using Reimage, Malwarebytes, Plumbytes Anti-MalwareNorton Internet Security or another reputable anti-virus. You should not pay the ransom due to two important reasons – money loss and future attacks. You can never know whether the felons creating ransomware virus are conscientious. They may not store a decryptor at all, so after transferring Monero, they may not send you a decryptor or send the one that is not working. Besides, paying the ransom is not a decent move as you will motive crooks to keep initiating their shady activities.

If you are not aware how to initiate Creeper removal or the ransomware keeps blocking your anti-virus continuously, you can follow the instructions provided at the end of this article. You will also find several alternative methods that can help you to decrypt files encrypted by Creeper virus.

Ransomware developers rely on the success of malspam campaigns

According to the latest reports, the usage of drive-by download attacks and exploit kits for ransomware distribution are falling since 2017.[3] Although some major attacks via RIG EK and other exploit kits have been revealed through the last year, the numbers are decreasing leaving malspam campaigns as the primary distributor of the file-encrypting virus.

However, the revelation of such a tendency does not mean that PC users can stop being careful with suspicious ads or start surfing on illegal and potentially dangerous websites. Precautionary measures have to be in mind all the time because hackers the old virus distribution methods are often refined coming back with the new strength.

One malware distribution strategy seems to be stable – that's spam emails. Hackers use various bots (Necurs most frequently) to disseminate tricky email messages with malicious email attachments. Such messages can mimic various authorities and indicate an attachment as invoice, report, or another official document. Usually, such attachments require to enable Macros and, if the potential victim, does that, he or she unintentionally activates the ransomware.

To protect yourself from similar cyber attacks, experts from virusi.bg[4] recommend you to keep a reputable anti-virus activated and update it regularly. Besides, avoid interaction with any content that looks suspicious to you. Although people often have a presentiment about email attachments or fake ads on the internet, curiosity often overcomes the fair of getting their PCs infected.

Learn how to remove Creeper virus quickly

Creeper removal can hardly be initiated without the assistance of the anti-virus tool. Unlike less dangerous viruses, ransomware is known for initiating multiple system's changes, including corruption of Registry Entries.
The problem is that you may not be able to remove Creeper virus with the help of an anti-virus. It may prevent the anti-malware tool from being launched and block the installation of a new one. In this kind of situation, you should initiate the steps that are given below.

Once you eliminate Creeper ransomware from the system, you should try to recover your files from Shadow Volume Copies, previous Windows version or use additional data recovery tools. Those who have file backups should skip data recovery steps and go ahead to the recovery from backups.

Offer
We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software you agree to our privacy policy and agreement of use.
do it now!
Download
Reimage (remover) Happiness
Guarantee
Download
Reimage (remover) Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to remove virus damage. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
More information about this program can be found in Reimage review.

If you decided to select another anti-spyware, uninstall Reimage from your computer.
Press mentions on Reimage
Alternate Software
Malwarebytes
Alternate Software
Malwarebytes

To remove Creeper virus, follow these steps:

Remove Creeper using Safe Mode with Networking

Creeper removal can become a mission impossible if the virus blocks your anti-virus. If you are stuck on your PC with all the files encrypted, you should follow the steps below to reboot your PC into Safe Mode with Networking. This way, you should be able to run a scan with your anti-virus:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Creeper

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Creeper removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Creeper using System Restore

These steps apply for those who cannot launch anti-virus even when in Safe Mode with Networking or if they cannot access this mode:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Creeper. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Creeper removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Creeper from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

The methods that are given below can help you to recover files encrypted by Creeper ransomware.

If your files are encrypted by Creeper, you can use several methods to restore them:

Use Data Recovery Pro utility

Data Recovery Pro is a tool helping people to retrieve files after system's crash or accidental deletion. Nevertheless, it recovered millions of files encrypted by ransomware viruses, so it's worth giving a try:

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Creeper ransomware;
  • Restore them.

Windows Previous Versions feature can recover the most important files

If you have enabled a Restore Point before Creeper virus attacked your PC, then you should try to recover the most important files with the following guide:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Try ShadowExplorer

Once you remove Creeper ransomware, install ShadowExplorer and try to recover your files from Windows Shadow Volume Copies. 

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Creeper decryptor is not yet available

About the author

Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

References