Infected with PoisonFang ransomware? Need to decrypt your files?

What is PoisonFang ransomware

PoisonFang is a cryptovirus developed by Israeli programmers. It encrypts user files using various algorithms. Files that are encrypted are very different, they can be office documents, PDF files, archives, multimedia (photo and video) and much more. The probability of decrypting these files is scanty because it removes copies of target files and erases the system restore points. This is how this cryptographer looks:

executive file icon

Trending Start hijacker

note with the requirements of scammers

PoisonFang Ransomware

here’s the text file content:

THIS SOFTWARE IS FOR ACADEMIC RESEARCH PURPOSES ONLY!
Poisonfang was developed as part of a ransomware project at the Technion Israel Institute of Technology

This virus represents itself as a research development of the Technical Institute, but this is a cover for fraudsters. Developers require users to contact them at the specified e-mail addresses, then pay for decrypting the user files. Do not pay at all. Attackers will return nothing to you! You need to use our recommendations to remove it and decrypt your files.

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. If you want to decrypt your files, please follow our instruction below or, if you have any difficulties, please contact us: submit@securitystronghold.com. We really can help to decrypt your files.

How PoisonFang ransomware infected your PC

The main reason for the penetration of PoisonFang is that there are unprotected network settings. Also, it comes as an attachment in spam emails. You need to use special programs, utilities and antivirus programs that can protect your computer, mailboxes, and networks. Also, do not forget to backup your files, create the system restore points and keep copies of important information on removable devices or multiple computers if it’s possible. Below we provide workable steps to decrypt and restore your files and remove it from your PC.

First of all, don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the PoisonFang ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to PoisonFang ransomware – files, folders, registry keys.

 

Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

You may find more detailed information about antivirus products in our article – Top 5 Antivirus Software for Windows

Restore your files using shadow copies

stellar-data-recovery

  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.
Download Stellar Data Recovery

Step 2: Remove following files and folders of PoisonFang ransomware:

Related connections or other entries:

xxxx://poisonfangproject.azurewebsites.net/
xxxx://victimblob.blob.core.windows.net
xxxx://192.168.56.152:2869/upnphost/udhisapi.dll?content=uuid:4f8e1a2d-3fec-4a15-86de-6f8fafe83a56
xxxx://[fe80::c8c7:a44f:142b:cf30]:2869/upnphost/udhisapi.dll?content=uuid:4f8e1a2d-3fec-4a15-86de-6f8fafe83a56
xxxx://ocsp.msocsp.com0
xxxx://www.microsoft.com/pki/mscorp/cps0
xxxx://ocsp.digicert.com0
xxxx://crl3.digicert.com/Omniroot2025.crl0=
xxxxs://webcourse.cs.technion.ac.il/236499/Spring2018

Related files:

PoisonfangDropper.pdb
\P0150N\
PoisonfangDropper.exe
PoisonfangService.exe
PoisonfangService.InstallLog
PoisonfangService.InstallState
PoisonfangUI.exe
PoisonBrowserExtractor.exe
fang.ico
Poisondrop.zip
%:\Windows\P0150N\PoisonfangService.exe
%:\Windows\P0150N\

How to decrypt files infected by PoisonFang ransomware?

You can try to use manual methods to restore and decrypt your files.

Decrypt files manually

Restore the system using System Restore

system restore

Although latest versions of PoisonFang ransomware remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged. This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Protect your computer from ransomware

hitmanpro alert with cryptoguard

Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.

Download HitmanPro.Alert with CryptoGuard

Written by Rami Douafi

Leave a Reply

Your email address will not be published. Required fields are marked *