Severity scale:  

Remove Zepto virus (Updated Guide) - 2018 update

removal by Olivia Morelli - -   Also known as zepto ransomware | Type: Ransomware

Zepto ransomware is an alternative version of the infamous Locky file-encrypting virus

Screenshot of Zepto virus ransom note and payment site

Questions about Zepto virus

Zepto ransomware is one of the dangerous Locky virus versions which performs data encryption. This ransomware family is considered to be one of the most hazardous cyber threats of 2016 and spreads via malicious spam emails[1]. According to the researchers approximately 150 thousand letters were holding the obfuscated payload of Zepto ransomware as an attachment[2]. The malspam campaign is detected spreading via Necurs botnet and compromised files contain .zepto extension. Zepto virus uses the combination of AES 128 and RSA 2048 algorithms to encode information. 

Name Zepto
Type Ransomware
Precursor Locky
Cryptography AES 128; RSA 2048
Latest versions Lukitus; Ykcol
Extension .zepto
Ransom note _[2 chars]_HELP_instructions.html; _[2 chars]_HELP_instructions.txt
Distribution Spreads as .7z email attachments but might employ other distribution methods as well
Decryption You can decrypt files with .zepto extension using the professional decryption software. Find it at the end of this article
Removal Uninstall Zepto ransomware by running a full system scan with Reimage Reimage Cleaner Intego

The latest versions detected of Zepto ransomware are Lukitus and Ykcol. Users are tricked into downloading an infected .zip or .docm attachment by tempting subject lines, such as the following:

  • Please, see the attachment;
  • To the head of sales;
  • Scanned image;
  • etc.

Similarly to Bart ransomware, this virtual infection attempts to deceive users to execute a JavaScript file or enable macros. Once it's done, it encodes files with RSA-2048 and AES-128 ciphers. As a result, they get blocked bearing .zepto extension. At the end of the encryption process [3], Zepto ransomware changes the desktop picture with an image that presents information about the virus and a request to pay a ransom. If this menace has befallen you, you should still remove Zepto. You might also try this free Zepto Decrypter afterward.

Now the attention might be directed to Lukitus and Ykcol versions which hide in .7z email attachments. Though Zepto virus was most active in the end of 2016, even now some companies report getting infected with this version. Since the cyber criminals shuffle Locky variations, it would not be surprising if you can get infected with Zepto malware after opening .7z attachment.

Zepto ransomware messageZepto ransomware drops instructions presented inside the ransom note after completing data encryption.

Take into the consideration that hackers apply emotional pressure to persuade users to hurry with the payment [4]. Likewise, they succeeded in collecting more than $100,000 with the help of Zepto ransomware. Let us assure that there are ways to complete Zepto removal. The most effective of them is to use Reimage Reimage Cleaner Intego

Like in the previous versions, Zepto activates via the dll file which is executed by rundll32.exe file. The latter is a legitimate system process. Likewise, it allows escape users' intervention. Just as other ransom-demanding viruses, this malware leaves one of the following ransom notes:

  • _[2 chars]_HELP_instructions.html
  • _[2 chars]_HELP_instructions.txt 

Zepto ransomware states that there is no other way to decrypt files but to pay a ransom and receive a private key and a decryption program. We highly discourage you from purchasing the tool promoted by the perpetrators as it seems a malicious software as well. 

Instructions on how to access Zepto payment site are also provided by this virus. During the investigation process, we discovered that the payment site advertises Locky decrypter which was used by another ransomware called Locky. Now it can be purchased for 4 Bitcoins (approximately 2541 USD).

Of course, you should never think of that because you can be left without both, your files and your money. To recover your data, you should remove Zepto first and then restore your files from a backup. Take a look at the ransom note by Zepto virus: 


All of your files are encrypted with RSA-2048 and AES-128 ciphers.
More information about the RSA and AES can be found here:

Decrypting of your files is only possible with the private key and decrypt program, which is on our secret server.
To receive your private key follow one of the links:

If all of this addresses are not available, follow these steps:
1. Download and install Tor Browser:
2. After a successful installation, run the browser and wait for initialization.
3. Type in the address bar:
4. Follow the instructions on the site.

After Locky rampaged on the virtual world for a couple of months, soon afterward, the cyber campaign of Zepto was launched. It reached its peak in July. Ordinary and corporate users all around the world were assaulted by Zepto ransomware. Thus, even if you reside in Sweden[5], which is regarded as the country with the lowest malware rate, stay vigilant.

As previously mentioned, the threat employs swift [XXX|XXXX].js file for a disguise. By pretending to be a financial report or invoice, it captures victims' attention. Opening the attachment enables Zepto ransomware to start its mischief in thousands of computers. After sending HTTP GET requests, the threat is able to get important information about victims computers. This also enables .zepto file extension virus to infect the bigger amount of computers.

By planting its wscript.exe executable [6] among the registry files, Zepto ransomware keeps the device in its claws even if you reboot it. Moreover, the virus has been updated to such extent that even Windows Defender fails to block it. Therefore, it is of crucial importance that your security applications are updated daily.

Moreover, ODIN ransomware appeared as a backup to the original version of the threat. It seems that the felons do not intend to step aside.

Zepto virusExpert demonstrates that Zepto virus suggests buying Locky Decryptor. This fact proves that Zepto ransomware is a version of Locky ransomware.

Criminals keep releasing updates of the crypto-malware

Despite all the new variants of Locky ransomware, Zepto virus is still detected spreading all across the world. Researchers note that this file-encrypting cyber threat reached its distribution peak of 150% from July to September in 2017. Nonetheless, since then, though the spam campaign of this particular version subsided slightly, IT specialists spot its variations once in a while. The recent Zepto version disguised under luainstall.dll file. It also disguised under the following names:

  • UFDFcTFN2.dll.3904.dr;
  • LPwBHJjO2.dll;
  • nvFjEHFele2.dllCrTqhHDO3.dll;
  • BsTVXmdKk1.dll;
  • 3_FILE.exe
  • oqmCxkcjyFG1.dll[7].

Malware actively targets European countries, the United States, South America, and East Asian regions. Lately, virus researchers spotted that Locky ransomware, as well as its newest version – .aesir file extension virus, stepped in Facebook. Malware started spreading via Facebook’s messages by sending malicious SVG image file. Victims, who clicked on it, were redirected to a suspicious domain that looked like YouTube.

Zepto ransomware distributionHackers spread Zepto ransomware inside the malicious spam emails.

However, they were asked to install the plugin to play the video. This bogus plugin is Nemucod Trojan which is responsible for activating malware on the affected computer. Malware analysts expect Zepto to spread on Facebook or other social networks as well. Therefore, chances to encounter this cyber menace remain high. The only free and safe data recovery solution is backups.

The peculiarities of the original Locky ransomware

The precursor of Zepto ransomware, known as Locky virus, has numerous versions which are regularly released in the cyberspace. The original version of the file-encrypting virus was first discovered in February. Attackers keep upgrading the malware to ensure that decryption tools by security firms would be disabled. Additionally, the updates help to improve the security of cybercriminals and help them remain anonymous. 

Zepto ransomware encryptionFiles encrypted by Zepto ransomware are appended with .zepto extension at the end of the filename.

Zepto is not as advanced as its previous version. However, security experts have already started making the virus decryption tool which should be quite similar to Locky decrypter and should show up anytime soon. This virus was, and still is, one of the most powerful ransomware variants and none of the malware researchers attempts’ to create a decryption tool for it were successful.

Zepto ransomware spreadVictims receive innocent-looking emails from non-existent people with malicious attachments which are holding the payload of Zepto ransomware.

Unfortunately, it seems that these cybercriminals know what they are doing, and they do take advantage of their programming skills because their malicious programs appear to be uncrackable. If you are reading this article and your computer is not infected yet, please follow these rules to protect your computer from this ransomware and avoid a need to deal with Zepto removal:

  • Install an anti-malware software on your computer to keep it protected from malicious viruses;
  • Keep all your software up-to-date. Our tip is to enable automatic updates;
  • BACK UP your files. In fact, this is the only way to secure your data from encryption. You have to create file copies and save them on a removable storage drive, and then unplug it from your computer. You can use backups in case your computer gets hit by a ransomware;
  • Never open suspicious emails or files attached to them! Cyber criminals distribute this virus by sending deceptive letters to thousands of email accounts, claiming that they are delivering invoice, phone bill, speeding ticket, CV, or a similar document.

Ransomware spreads similarly to other cyber threats

This dangerous file-encrypting virus is distributed using well-known tactics — malicious spam emails which are holding deceptive attachments. Usually, the bogus scripts are embedded into .zip or .docm files. Hackers also employ social engineering methods to disguise the payload of the ransomware under innocent-looking file names.

Such malicious code can be activated via Word Macros function or by launching JavaScript file, so make sure you don’t do that in case you see a scrambled text after opening Word document that you have received via email.

Zepto virus emailPeople are tricked to infiltrate their systems with Zepto ransomware via malspam campaigns.

Criminals also send JS files, which can be activated just by opening them. In addition, though such method is not widely practiced, but beware of exploit kits. They might be trojans, rogue malware or any malignant files.

By passing themselves off as legitimate files they might slip into the system and then launch Zepto when the time comes. In order to decrease the possibility of such malware attack, do not forget to update your security applications daily.

In general, we recommend you to avoid clicking or opening any kind of content online if you are not sure if it is secure. Cyber criminals use numerous techniques to deceive computer users, and it can be hard to keep up with the news and know all sources of infection.

We advise you to protect your computer with anti-malware software, backup your data, and refrain from opening emails sent from strangers. For more information about ceasing Zepto hijack, take a look at this article — How to protect your computer from Locky? 5 tips for taking control.

Uninstall Zepto virus and use an official decryption software for data recovery

Users who want to remove Zepto ransomware should keep in mind that this cyber threat is highly dangerous. Not only it can trick you into uninstalling essential system files but also let other malicious programs inside your computer. Thus, follow the instructions to get rid of this file-encrypting virus safely. 

Zepto removal requires advanced IT knowledge. Likewise, we recommend you to get help from professional antivirus tools, like Reimage Reimage Cleaner Intego, or Malwarebytes. They are designed to identify and locate all ransomware-related components to clean your entire computer system. 

Once you get rid of Zepto ransomware, you will be able to proceed to data recovery. You can decrypt files with .zepto extension using an official decryption tool. It is presented at the end of this article alongside alternative solutions to retrieve compromised information.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Zepto virus, follow these steps:

Remove Zepto using Safe Mode with Networking

Ensure that the virus won't block an antivirus software by rebooting your PC into Safe Mode with Networking.

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Zepto

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Zepto removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Zepto using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Zepto. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that Zepto removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Zepto from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by Zepto, you can use several methods to restore them:

Use Data Recovery Pro to recover your files encrypted by Zepto

Originally, Data Recovery Pro was created to retrieve the files after an unexpected system crash or simply after the careless elimination of the files. However, you can also try using it to recover your important files.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Zepto ransomware;
  • Restore them.

Rely on Windows Previous Versions functionality to recover files affected by Zepto

You should be able to recover the data using Windows Previous Versions feature if the System Restore was enabled on your computer. For that, use the following guide: 

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Use Shadow Explorer to decrypt encrypted files

One of the main features of Locky and its “cousin” Zepto, which helped it to retain the title among ransomware threats, is its ability to locate and delete the volume shadow copies. They are automatically created by the operating system in case a system is crashed unexpectedly. However, you should still try to recover your files encrypted by Zepto with the help of these steps:

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Zepto decryption software

You might launch this utility to decode the files affected by Zepto.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Zepto and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant a full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.


Recover files after data-affecting malware attacks

While much of the data can be accidentally deleted due to various reasons, malware is one of the main culprits that can cause loss of pictures, documents, videos, and other important files. More serious malware infections lead to significant data loss when your documents, system files, and images get encrypted. In particular, ransomware is is a type of malware that focuses on such functions, so your files become useless without an ability to access them.

Even though there is little to no possibility to recover after file-locking threats, some applications have features for data recovery in the system. In some cases, Data Recovery Pro can also help to recover at least some portion of your data after data-locking virus infection or general cyber infection. 


About the author
Olivia Morelli
Olivia Morelli - Ransomware analyst

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Olivia Morelli
About the company Esolutions

Removal guides in other languages