Infected with GandCrab2 Ransomware? Need to decrypt your files?

What is GandCrab2 Ransomware

GandCrab2 is a successor of previous wide-spread ransomware-type virus GandCrab. This virus encrypts user data using AES-256 and RSA-2048 encryption algorithms. GandCrab2 Ransomware appends .CRAB extension to affected files. If your files have .GDCB extension see our article about another version of Gandcrab Ransomware. Following successful encryption ransomware demands ~$400 in Dash cryptocurrency. Ransom note also states, that this amount will double, if not paid in 48 hours. that After finishing encryption process virus creates CRAB-DECRYPT.txt file with following text inside:

---= GANDCRAB =---


All your files documents, photos, databases and other important files are encrypted and have the extension: .GDCB

The only method of recovering files is to purchase a private key. It is on our server and only we can recover your files.

The server with your key is in a closed network TOR. You can get there by the following ways:

1. Download Tor browser -

2. Install Tor browser

3. Open Tor Browser

4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/[id]

5. Follow the instructions on this page

On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free.

If you can't download TOR and use it, or in your country TOR blocked, read it:
1. Visit
2. Download and install qTOX on your PC.
3. Open it, click "New Profile" and create profile.
4. Search our contact - 6C5AD4057E594E090E0C987B3089F74335DA75F04B7403E0575663C26134956917D193B195A5
5. In message please write your ID and wait our answer: 6361f798c4ba3647


Do not try to modify files or use your own private key - this will result in the loss of your data forever!

GandCrab2 Ransomware uses TOR network for hosting its webites. Previous version of GandCrab was decoded, due to mistake of its developers. Decryption keys were gained, thanks to Romanian police and MalwareHunterTeam. In the second version, malefactors use politiaromana.bit and malwarehunterteam.bit hostnames as an irony. Use this tutorial to remove GandCrab2 Ransomware and decrypt .CRAB files for free. If you won’t succeed in decryption, just preserve essential files to the time working decryptor appears.

crab encrypted files

Several researchers reported, that GandCrab Ransomware 2.1 already released. Main differencies from GandCrab 2 are another names of ransom notes: CRAB-DECRYPT.txt,
Also a number of dangerous sites was icreased. To avoid an infiltration we strongly recommend to block next domains in your firewall:

GandCrab2 Ransomware

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. Also check following website for possible decryptor: Emsisoft Decryptors.

How GandCrab2 Ransomware infected your PC

GandCrab2 Ransomware

It spreads through two sets of exploits: RIG EK and GrandSoft EK. GandCrab2 Ransomware is also available as RaaS on the cyber underground forums. It can also begin to spread by hacking through an unprotected RDP configuration, using email spam and malicious attachments, fraudulent downloads, web injections, fake updates, repackaged and infected installers. Ransom is asked to be paid in Dash coin, that also makes the task difficult for the police, as the user in this network is often anonymous. Encryption starts in the background. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.

First of all, don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the GandCrab2 Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to GandCrab2 Ransomware – files, folders, registry keys.


Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

Step 2: Remove following files and folders of GandCrab2 Ransomware:

Remove following registry entries:

no information

Remove following files and folders:

GandCrab Decryptor.exe

How to decrypt files infected by GandCrab2 Ransomware (.CRAB files)?

Restore .CRAB files using shadow copies


  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.

Use automated decryption tools

Norton decryptor for gandcrab2 ransomware

There is ransomware decryptor from BitDefender that can decrypt .CRAB files. It is free and may help you restore .CRAB files encrypted by GandCrab2 Ransomware virus. Download it here:

Download GandCrab Decryptor

You can also try to use manual methods to restore and decrypt .CRAB files.

Decrypt .CRAB files manually

Restore the system using System Restore

system restore

Although latest versions of GandCrab2 Ransomware remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – GandCrab2 Ransomware by GandCrab2 Ransomware). This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Protect your computer from ransomware

hitmanpro alert with cryptoguard

Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.

Download HitmanPro.Alert with CryptoGuard

Information provided by: Alexey Abalmasov


    • Unfortunately, a universal tool, able to decrypt gandcrab2 ransomware doesn’t exist. We recommend to save all encrypted files on flash or cloud, it’s highly likely, that decryption tool will be created in future. The previous version of gandcrab ransomware virus is decryptable now.

  1. sachant que tout mes données (image; son; video; pdf….ect) sont dans les partitions D et E et sont encore en .crab !!! si je réinstalle windows puis je les récupérer? et sachant que j’ai essayer avec smadav, spyhuter; bitdefender; kaspersky; Fix.bat le démarrage en mode sans echec; regedit; msconfig; appdata; host mais rien (walou) comment je fais pour récupérer mes fichier

  2. my server username and password has also been affected / changed so cannot log onto even in safe mode – what to do ?

    • Hello! We recommend removing a virus firstly. If you can’t use manual methods, you can use automatic removal tool, for example, spy hunter. Please, use links from our article

Leave a Reply

Your email address will not be published. Required fields are marked *