Nemucod Ransomware virus Removal Guide
What is Nemucod Ransomware virus?
Nemucod ransomware: how does it operate?
Nemucod virus has the same name as a malicious Nemucod Trojan (known as JS.Nemucod), however, these viruses are different. The ransomware virus is programmed specifically for encrypting personal information. Afterward, it urges a victim to pay the money in return for the data. If you are concerned about the safety of your device and you suspect that the system was infected with this threat, you should consolidate the protection by installing an anti-spyware program, such as FortectIntego, which can also remove Nemucod virus.
Some speculate that this ransomware is just another version of officially terminated TeslaCrypt because the above-mentioned trojan used to distribute the infamous threat. Likewise, Nemucod ransomware mainly targets users living in Canada and the US. However, if you live outside these countries, remain vigilant because you never know when the virus appears in front of your OS’ doorstep. The virus is reported to be using RSA and AES asymmetric encoding algorithms. Thus, decrypting the locked files becomes more challenging. Moreover, due to the shape-shifting peculiarities of Nemucod malware, there is still a lack of consistent analysis. In some cases, it is reported that the virus may append an .crypted extension to the encrypted files, while in another case – .nemucod file extension.
If your computer has poor protection, the virus easily might pave its way into the system and start rampaging. After it tracks down all possible important files and encodes them, it drops a DECRYPT.txt file with the instructions. Furthermore, you are urged to purchase Bitcoins. This action is supposed to help you retrieve the valuable information. Keep in mind that it is cyber criminals that you are dealing with, so brush aside naïve expectations and concentrate on Nemucod removal instead. Before we move on the section where we will introduce the solution to this threat, it is important to be wary of the distribution methods of this ransomware.
What methods are used for this crypto-ransomware proliferation?
There are a few main ways how Nemucod tiptoes into target computers. It can either reach the computer system when the victim visits an infected website that hosts an exploit kit , clicks on a malware-laden ad, or downloads a malicious email attachment. Hackers have mastered techniques to threaten users and convince them into opening the spam email with an infected link. At the moment, it is known that the malicious virus is delivered via emails that deliver attachments titled as [Scan/Receipt/Document]_[number].zip. The message title typically suggests that the email delivers a notification/fine/receipt/etc. Currently, the virus is being distributed via such emails:
- Sender: FedEx International MailService;
- Message title: Delivery Notification, ID 00000430307;
- Attachment: Label_00000430307.zip, SCAN_invoice_58492400.zip or similar.
You should never ever open email attachments that unknown people or organizations send to you. Use your common sense, and when you receive a message from a person/company that has never contacted you before or recently, think whether you were supposed to get a message from such sender. If not, better stay away from the email. Another indicator that shows you’re dealing with cyber criminals is a suspicious-looking sender’s email address. You must understand that email@example.com and similar emails do not belong to employees of well-known companies and that trustworthy people would never write from such emails to clients in behalf of a certain company. Unfortunately, users often recklessly rush to open malicious files without realizing the menace that lies behind them. Be smart and do not let scammers trick you! If you happen to notice any similar email in your spam or Inbox folder, delete it without entering it and opening the attachment. In addition, the malware may have used JS.Nemucod trojan to attack your OS. Due to its technical characteristics, some security programs might overlook it.
Nemucod Decryptor is available: decrypt your files for free
Luckily, malware researchers run down Nemucod’s attempts to wreak havoc on computers and ask for ransoms to restore infected systems. Although recently virus has been updated, malware analysts have managed to create an updated Nemucod decrypter that helps to restore files compromised not only by earlier versions of this ransomware, but also ones that have been corrupted by the latest virus variant (the one that emerged in December 2016). Therefore, if you have been hit by this ransomware, simply remove it from the system (essential step, do not try to decrypt your files while the virus is still on the system – uninstall it and the rest of malicious files/programs using anti-malware software!), and download the decryption tool here. The tool is created by a malware researcher F.Wosar, who has been creating antidotes for ransomware viruses for a long time now. You can find detailed data recovery instructions below the article.
Get rid of Nemucod ransomware now
Regarding the complex structure of the ransomware, automatic Nemucod removal might be the only choice. Thus, do not hesitate to install the anti-malware program like FortectIntego so that it could remove Nemucod within a glimpse. The recommended software will ensure that no potentially malicious files are left. It can also protect from similar ransomware variants, such as Locky, Cerber, or Thor. Some users reported that the virus blocked attempts to launch anti-malware software, so please take a look at ransomware removal instructions provided below the article. If you have also encountered this program, take a look at the recovery instructions provided on this page. To sum up, keep in mind that the Internet is not the place where you can surf carelessly without having proper protection.
Getting rid of Nemucod Ransomware virus. Follow these steps
Manual removal using Safe Mode
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.
Step 1. Access Safe Mode with Networking
Manual malware removal should be best performed in the Safe Mode environment.
Windows 7 / Vista / XP
- Click Start > Shutdown > Restart > OK.
- When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
- Select Safe Mode with Networking from the list.
Windows 10 / Windows 8
- Right-click on Start button and select Settings.
- Scroll down to pick Update & Security.
- On the left side of the window, pick Recovery.
- Now scroll down to find Advanced Startup section.
- Click Restart now.
- Select Troubleshoot.
- Go to Advanced options.
- Select Startup Settings.
- Press Restart.
- Now press 5 or click 5) Enable Safe Mode with Networking.
Step 2. Shut down suspicious processes
Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:
- Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
- Click on More details.
- Scroll down to Background processes section, and look for anything suspicious.
- Right-click and select Open file location.
- Go back to the process, right-click and pick End Task.
- Delete the contents of the malicious folder.
Step 3. Check program Startup
- Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
- Go to Startup tab.
- Right-click on the suspicious program and pick Disable.
Step 4. Delete virus files
Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:
- Type in Disk Cleanup in Windows search and press Enter.
- Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
- Scroll through the Files to delete list and select the following:
Temporary Internet Files
- Pick Clean up system files.
- You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):
After you are finished, reboot the PC in normal mode.
Remove Nemucod Ransomware using System Restore
Step 1: Reboot your computer to Safe Mode with Command Prompt
Windows 7 / Vista / XP
- Click Start → Shutdown → Restart → OK.
- When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
- Select Command Prompt from the list
Windows 10 / Windows 8
- Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
- Now select Troubleshoot → Advanced options → Startup Settings and finally press Restart.
- Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window.
Step 2: Restore your system files and settings
- Once the Command Prompt window shows up, enter cd restore and click Enter.
- Now type rstrui.exe and press Enter again..
- When a new window shows up, click Next and select your restore point that is prior the infiltration of Nemucod Ransomware. After doing that, click Next.
- Now click Yes to start system restore.
Bonus: Recover your dataGuide which is presented above is supposed to help you remove Nemucod Ransomware from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.
If your files are encrypted by Nemucod Ransomware, you can use several methods to restore them:
Only need a few files? Restore using Windows Previous Versions
This method is effective when you need only a few files and you are in a rush. Please take note that you cannot use this method if you have never enabled System Restore function.
- Find an encrypted file you need to restore and right-click on it;
- Select “Properties” and go to “Previous versions” tab;
- Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.
If you’re lucky enough to be facing a foolish Nemucod’s variant, you might have an option to restore your files from Volume Shadow Copies. Here, you can find a short tutorial on how to detect them with ShadowExplorer tool:
- Download Shadow Explorer (http://shadowexplorer.com/);
- Follow a Shadow Explorer Setup Wizard and install this application on your computer;
- Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
- Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.
Use Nemucod decrypter
Here, you can find comprehensive instructions how to use a decryption tool for Nemucod.
1. If you haven’t done that already, download the decrypter here.
2. The tool doesn’t do everything on its own. You will need to help it a little. To decrypt all files, you need to find an encrypted file of at least 4096 bytes in size, and also find an unencrypted version of it. If you have a copy of an encrypted file in your email, Dropbox, or elsewhere – download it to your computer.
3. You need to select both – the unaffected and the encrypted file and drag them both to the decrypter executable. The decrypter then produces the encryption parameters.
4. As soon as the decryptor finds the decryption key and displays a pop-up message, click OK. Next, you will have to agree with license terms. Do not forget to read them first!
5. If you want, you can customize decrypter’s options, or you can simply click Decrypt.
Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Nemucod Ransomware and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes
How to prevent from getting ransomware
Protect your privacy – employ a VPN
There are several ways how to make your online time more private – you can access an incognito tab. However, there is no secret that even in this mode, you are tracked for advertising purposes. There is a way to add an extra layer of protection and create a completely anonymous web browsing practice with the help of Private Internet Access VPN. This software reroutes traffic through different servers, thus leaving your IP address and geolocation in disguise. Besides, it is based on a strict no-log policy, meaning that no data will be recorded, leaked, and available for both first and third parties. The combination of a secure web browser and Private Internet Access VPN will let you browse the Internet without a feeling of being spied or targeted by criminals.
No backups? No problem. Use a data recovery tool
If you wonder how data loss can occur, you should not look any further for answers – human errors, malware attacks, hardware failures, power cuts, natural disasters, or even simple negligence. In some cases, lost files are extremely important, and many straight out panic when such an unfortunate course of events happen. Due to this, you should always ensure that you prepare proper data backups on a regular basis.
If you were caught by surprise and did not have any backups to restore your files from, not everything is lost. Data Recovery Pro is one of the leading file recovery solutions you can find on the market – it is likely to restore even lost emails or data located on an external device.