• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Ransomware  /  Decryption Tool for CrySiS/XTBL Ransomware
Decryption Tool for CrySiS/XTBL Ransomware
16 December 2016

Decryption Tool for CrySiS/XTBL Ransomware

Written by Rajib Singha
Rajib Singha
Ransomware
2

The decryption of CrySiS/XTBL Ransomware is now possible thanks to the recent release of its master decryption keys needed to recover the files encrypted by the ransomware. While we couldn’t guess the apparent reason behind the release, we have used this opportunity to help those who were affected by the ransomware.

The Quick Heal Threat Research Labs has developed a decryption tool for CrySiS/XTBL  (known as QH-Ransom-Decryptor) with the published keys. This tool comes for free and can be downloaded from the link mentioned below:

Download link:
Seqrite Ransom Decryptor Tool

As of now, the decryption tool works on files affected by the below-listed ransomware families:
1. Troldesh Ransomware [.xtbl]
2. Crysis Ransomware [.CrySiS]
3. Cryptxxx Ransomware [.crypt]
4. Ninja Ransomware [@aol.com$.777]
5. Apocalypse Ransomware [.encrypted]
6. Nemucod Ransomware [.crypted]
7. ODC Ransomware [.odcodc]
8. LeChiffre Ransomware [.LeChiffre]
9. Globe1 Ransomware [.hnyear]
10. Globe2 Ransomware [.blt]
11. Globe3 Ransomware [.decrypt2017]
12. DeriaLock Ransomware [.deria]
13. Opentoyou Ransomware [.-opentoyou@india.com]
14. Globe3 Ransomware [.globe & .happydayzz]
15. Troldesh Ransomware [.dharma]
16. Troldesh Ransomware [.wallet]
17. Troldesh Ransomware [.onion]

Note:
A Crysis/XTBL encryption can be identified from the below pattern of encrypted file extension:

  • File name.<extension>.<id-number>.<email>.xtbl/.CrySiS)

Example – “available.txt.id-340D4C04.{green_ray@india.com}.xtbl”

Instructions to use the QH-Ransom-Decryptor:

  1. Click on the Seqrite Ransom Decryptor Tool link and save the zip file on the system having the encrypted files. Extract the file.
  1. Right click on the extracted file and Run it as ‘Administrator’ to view the Decryption Window.
  1. Press Y to start the scan. The decryption tool will automatically scan the entire system for supported encrypted files. When an encrypted file is found, the tool will decrypt the file in its respective folder while keeping a copy of the encrypted file at the same time.

decryption-tool-for-crysis-ransomware

Fig1. Decrypted files will be present in the same folder along with their encrypted copies.

  1. After the scanning is complete, the decryption tool will show the final status displaying the number of encrypted files found and how many were successfully decrypted. The detailed information about the decryption status of each file can be obtained from the ‘Decryption.log’ generated in the same folder of the tool.
  1. Thereafter, you can open the decrypted files and verify if they are accessible/readable again.

If you come across any difficulty in using the decryption tool, kindly give us a call on 1800-212-7377 or visit our Support Center for further assistance.

 

Updated as of 7th March 2017.

 Previous PostHere’s why your startup might be the perfect target for hackers
Next Post  Top Seqrite features and solutions that made a mark in 2016
Rajib Singha

About Rajib Singha

Rajib is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital...

Articles by Rajib Singha »

Related Posts

  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
  • How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

    March 11, 2025
  • Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks

    January 31, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies