0kilobypt is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on March 1, 2016, this ransomware has been actively targeting systems worldwide.
Quick Facts
Ransomware Family
0kilobypt
First Seen
March 1, 2016
How 0kilobypt Ransomware Works
Targeted Files
NOSAMPLE
Destroys content of the files
Full extension -> .[rekoh4th@secmail.pro].CRYPT;.[Xieth8ie@secmail.pro].cr;.[andrey.taranov@protonmail.com].Iexei8bo;.[uroo7ohM@secmail.pro].val
File Encryption Patterns
0kilobypt modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..CRYPT..cr..val./\.\w{8}$/./\.\w{5}$/
Ransom Note and Payment Demands
After encrypting files, 0kilobypt displays ransom notes demanding payment for file recovery:
fileWHERE ARE YOUR FILES READ ME (ГДЕ ТВОИ ФАЙЛЫ, ПРОЧИТАЙ МЕНЯ).txt
Ransom message:
notes/WHERE ARE YOUR FILES READ ME (ГДЕ ТВОИ ФАЙЛЫ, ПРОЧИТАЙ МЕНЯ).txt
This 0kilobypt ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like 0kilobypt.