Starcat (.starcat) ransomware virus - removal and decryption options
Written by Tomas Meskauskas on
What kind of malware is Starcat?
Our discovery of Starcat occurred while inspecting malware samples submitted to VirusTotal. Upon examining Starcat, we concluded that it is ransomware that encrypts files (and makes them hidden after encryption) on the infected device.
Also, Starcat changes the desktop wallpaper, creates a ransom note ("recover files,view here.txt"), and appends the ".starcat" extension to filenames. For example, it renames "1.jpg" to "1.jpg.starcat", "2.png" to "2.png.starcat", and so forth.
Screenshot of files encrypted by this ransomware:
Starcat ransom note overview
The ransom note is written in several languages (English, Russian, Chinese, German, Japanese, French, Korean, Portuguese, Thai, Hebrew, Spanish, Italian, and Arabic). It informs the victim that all their files have been encrypted using the CHACHA20+RSA4096 algorithm, and the decryption key is also encrypted with RSA16384.
It says that only the attackers can decrypt the files and instructs the victim to pay $5,000 in XMR (Monero) within seven days. It warns that if the ransom is not paid, the key will be deleted, and the files will be made public. Lastly, the note provides an email address (cos.luise@gmx.com) for contact and a Monero wallet address for payment.
More details about ransomware
Victims of ransomware attacks typically cannot decrypt their files without the involvement of cybercriminals. It is not recommended to pay the attackers, as there is no guarantee that they will actually provide the decryption tools. Paying for data recovery can be avoided if the victim has data backups or access to third-party decryption tools.
Additionally, it is essential to remove ransomware from infected systems as quickly as possible. The malware can encrypt more files and spread to other devices on the local network if it is not removed.
Ransomware in general
There are numerous examples of ransomware variants, however, the purpose of most ransomware attacks is to extort money from victims. Unfortunately, victims are often forced to pay for decryption tools as the attackers are the only ones who have them.
Thus, it is advisable to regularly back up files and keep them on a remote server or unplugged storage device to avoid losses in case of a ransomware attack. Examples of different ransomware variants are Gengar, RedLocker, and Help_restoremydata.
How did ransomware infect my computer?
Cybercriminals often distribute ransomware via shady websites hosting pirated software, cracking tools, key generators, or technical support scams. Users become victims of ransomware attacks after they download and execute ransomware on their computers.
Additionally, threat actors can exploit vulnerabilities in outdated operating systems or programs and employ malicious advertisements, infected USB drives, P2P networks, compromised websites, third-party downloaders, and similar channels to deploy ransomware.
Name | Starcat virus |
Threat Type | Ransomware, Crypto Virus, Files locker |
Encrypted Files Extension | .starcat |
Ransom Demanding Message | recover files,view here.txt |
Free Decryptor Available? | No |
Ransom Amount | $5,000 in XMR (Monero) |
Monero Wallet Address |
48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYb v6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai |
Cyber Criminal Contact | cos.luise@gmx.com |
Detection Names | Avast (FileRepMalware [Misc]), Combo Cleaner (Dump:Generic.Ransom.Spora.01F280B9), Emsisoft (Dump:Generic.Ransom.Spora.01F280B9 (B)), Kaspersky (Trojan.Win32.Agent.xbuthd), Microsoft (Program:Win32/Wacapew.C!ml), Full List Of Detections (VirusTotal) |
Symptoms | Cannot open files stored on your computer, previously functional files now have a different extension (for example, my.docx.locked). A ransom demand message is displayed on your desktop. Cyber criminals demand payment of a ransom (usually in bitcoins) to unlock your files. |
Additional Information | Files are hidden after encryption |
Distribution methods | Infected email attachments (macros), torrent websites, malicious ads. |
Damage | All files are encrypted and cannot be opened without paying a ransom. Additional password-stealing trojans and malware infections can be installed together with a ransomware infection. |
Malware Removal (Windows) | To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
How to protect yourself from ransomware infections?
Always download apps and files from reputable sources, such as official web pages or app stores. Do not download pirated software or utilize cracking tools. Be careful with emails from unfamiliar senders, particularly those containing unexpected or irrelevant links or attachments.
Avoid clicking pop-ups, ads, and links on dubious websites and do not allow suspicious sites to show notifications. Regularly update the operating system and software, and use a trustworthy security tool to protect your system and remove threats.
If your computer is already infected with Starcat, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate this ransomware.
Starcat's ransom note, "recover files,view here.txt" (GIF):
Text presented in Starcat ransomware's text file:
hello, my friend! we have encrypted all your computer files. please do not use antivirus software, otherwise your files will never be recovered. the encryption algorithm uses CHACHA20+RSA4096, and your key is encrypted using RSA16384. in this world, no one can decrypt your files except us. even if you use a supercomputer, you cannot decrypt the files. how to get the files back? you must pay us $5,000 worth of XMR to decrypt your files. you can search for monero virtual currency on google, and then you can see its price and how to trade virtual currency. you only have 7 chances to send us emails, so don't try to bargain with us, it will be bad for you it doesn't help at all, but will only irritate us. if you don't complete the transaction within 7 days, we will delete your key and make all your files public! of course, you can send us 3 files less than 3mb, and we will decrypt them for free. after the decryption is completed, please send the XMR to the address we provide. when sending an email, send us your key and your transaction record together. after we receive your request, we will complete your request within 24 hours. i wish you a happy life!
our email: cos.luise@gmx.com
our XMR address: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
your rsa public key:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----your rsa private key: please pull the text to the bottom for viewing
Здравствуй, друг! мы зашифровали все ваши компьютерные файлы. Пожалуйста, не используйте антивирусное программное обеспечение, иначе ваши файлы никогда не будут восстановлены. алгоритм шифрования использует CHACHA20+RSA4096, а ваш ключ зашифрован с помощью RSA16384. в этом мире никто кроме нас не сможет расшифровать ваши файлы. Даже если вы используете суперкомпьютер, вы не сможете расшифровать файлы. как вернуть файлы? вы должны заплатить нам XMR на сумму 5000 долларов за расшифровку ваших файлов. Вы можете найти виртуальную валюту Monero в Google, а затем увидеть ее цену и способы торговли виртуальной валютой. у вас есть только 7 шансов отправить нам электронное письмо, поэтому не пытайтесь торговаться с нами, это будет плохо для вас, это совсем не поможет, а только разозлит нас. Если вы не завершите транзакцию в течение 7 дней, мы удалим ваш ключ и сделаем все ваши файлы общедоступными! Конечно, вы можете отправить нам 3 файла размером менее 3 Мб, и мы их бесплатно расшифруем. После завершения расшифровки отправьте XMR на указанный нами адрес. при отправке электронного письма отправьте нам свой ключ и запись транзакции вместе. после получения вашего запроса мы выполним ваш запрос в течение 24 часов. желаю тебе счастливой жизни!
наша электронная почта: cos.luise@gmx.com
наш адрес XMR: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
ваш открытый ключ RSA:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----ваш закрытый ключ RSA: Перейти внизу, посмотреть.
朋友你好!我們已經加密了您所有的電腦檔案。請不要使用防毒軟體,否則您的檔案將永遠無法恢復。加密演算法使用CHACHA20+RSA4096,你的金鑰使用RSA16384加密。在這個世界上,除了我們之外,沒有人可以解密您的檔案。即使您使用超級計算機,也無法解密檔案。如何取回文件?您必須向我們支付價值 5,000 美元的 XMR 才能解密您的檔案。您可以在谷歌上搜尋門羅幣虛擬貨幣,然後您可以看到它的價格以及如何交易虛擬貨幣。您只有 7 次向我們發送電子郵件的機會,所以不要試圖與我們討價還價,這對您來說沒有任何幫助,只會激怒我們。如果您在 7 天內未完成交易,我們將刪除您的金鑰並公開您的所有文件!當然,您可以向我們發送3個小於3mb的文件,我們將免費解密它們。解密完成後,請將XMR發送至我們提供的地址。發送電子郵件時,請將您的金鑰和交易記錄一起發送給我們。我們收到您的請求後,將在 24 小時內完成您的請求。祝您生活愉快!
我們的電子郵件:cos.luise@gmx.com
我們的XMR地址:48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
您的 rsa 公鑰:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----您的 rsa 私鑰:到底部查看鑰匙
Hallo mein Freund! Wir haben alle Ihre Computerdateien verschlüsselt. Bitte verwenden Sie keine Antivirensoftware, da Ihre Dateien sonst nie wiederhergestellt werden können. Der Verschlüsselungsalgorithmus verwendet CHACHA20+RSA4096 und Ihr Schlüssel wird mit RSA16384 verschlüsselt. Auf dieser Welt kann niemand außer uns Ihre Dateien entschlüsseln. Selbst wenn Sie einen Supercomputer verwenden, können Sie die Dateien nicht entschlüsseln. Wie bekomme ich die Dateien zurück? Sie müssen uns XMR im Wert von 5.000 US-Dollar zahlen, um Ihre Dateien zu entschlüsseln. Sie können auf Google nach der virtuellen Währung Monero suchen und dann den Preis sehen und erfahren, wie Sie mit der virtuellen Währung handeln können. Sie haben nur 7 Möglichkeiten, uns E-Mails zu senden, also versuchen Sie nicht, mit uns zu verhandeln, das wäre schlecht für Sie, es hilft überhaupt nicht, sondern wird uns nur irritieren. Wenn Sie die Transaktion nicht innerhalb von 7 Tagen abschließen, löschen wir Ihren Schlüssel und machen alle Ihre Dateien öffentlich! Selbstverständlich können Sie uns auch 3 Dateien mit einer Größe von weniger als 3 MB zusenden und wir entschlüsseln diese kostenlos. Nachdem die Entschlüsselung abgeschlossen ist, senden Sie bitte das XMR an die von uns angegebene Adresse. Wenn Sie eine E-Mail senden, senden Sie uns bitte Ihren Schlüssel und Ihre Transaktionsaufzeichnung zusammen. Nachdem wir Ihre Anfrage erhalten haben, werden wir Ihre Anfrage innerhalb von 24 Stunden bearbeiten. Ich wünsche dir ein glückliches Leben!
unsere E-Mail: cos.luise@gmx.com
unsere XMR-adresse: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
Ihr öffentlicher RSA-Schlüssel:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----Ihr privater RSA-Schlüssel: Bitte ziehen Sie den Text zum Anzeigen nach unten
こんにちは、友よ!あなたのコンピュータファイルはすべて暗号化しました。ウイルス対策ソフトウェアは使用しないでください。そうしないと、ファイルは回復されません。暗号化アルゴリズムはchacha20 + RSA4096を使用し、キーはRSA16384を使用して暗号化されます。この世界では、私たち以外の誰もあなたのファイルを復号化できません。スーパーコンピューターを使用しても、ファイルを復号化することはできません。ファイルを取り戻すには?ファイルを復号化するには、5,000ドル相当のXMRを支払う必要があります。Googleでmonero仮想通貨を検索すると、その価格と仮想通貨の取引方法を確認できます。メールを送信できるチャンスは7回だけですので、私たちと交渉しないでください。それはあなたにとって悪いですし、まったく役に立たず、私たちを苛立たせるだけです。7日以内に取引を完了しないと、キーを削除し、すべてのファイルを公開します。もちろん、3MB未満のファイルを3つ送信していただければ、無料で復号化します。復号化が完了したら、弊社が提供するアドレスに XMR を送信してください。メールを送信する際は、キーとトランザクション レコードを一緒に送信してください。リクエストを受信してから 24 時間以内にリクエストを完了します。幸せな人生をお祈りします!
弊社のメール アドレス: cos.luise@gmx.com
弊社の XMR アドレス: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
RSA 公開キー:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----RSA 秘密キー: 一番下に行って鍵を見てください
bonjour mon ami! nous avons crypté tous vos fichiers informatiques. Veuillez ne pas utiliser de logiciel antivirus, sinon vos fichiers ne seront jamais récupérés. l'algorithme de cryptage utilise CHACHA20+RSA4096 et votre clé est cryptée à l'aide de RSA16384. dans ce monde, personne ne peut décrypter vos fichiers à part nous. Même si vous utilisez un superordinateur, vous ne pouvez pas décrypter les fichiers. comment récupérer les fichiers ? vous devez nous payer 5 000 $ de XMR pour décrypter vos fichiers. vous pouvez rechercher la monnaie virtuelle monero sur Google, puis voir son prix et comment échanger de la monnaie virtuelle. vous n'avez que 7 chances de nous envoyer des emails, alors n'essayez pas de négocier avec nous, ce sera mauvais pour vous, cela n'aidera pas du tout, mais ne fera que nous irriter. Si vous ne finalisez pas la transaction dans les 7 jours, nous supprimerons votre clé et rendrons tous vos fichiers publics! bien sûr, vous pouvez nous envoyer 3 fichiers de moins de 3 Mo, et nous les décrypterons gratuitement. Une fois le décryptage terminé, veuillez envoyer le XMR à l'adresse que nous fournissons. lors de l'envoi d'un e-mail, envoyez-nous ensemble votre clé et votre relevé de transaction. après réception de votre demande, nous compléterons votre demande dans les 24 heures. je te souhaite une vie heureuse!
notre email: cos.luise@gmx.com
notre adresse XMR : 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
votre clé publique rsa:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----votre clé privée rsa: en bas pour voir vos clés
안녕 친구! 우리는 귀하의 모든 컴퓨터 파일을 암호화했습니다. 바이러스 백신 소프트웨어를 사용하지 마십시오. 그렇지 않으면 귀하의 파일은 절대 복구되지 않습니다. 암호화 알고리즘은 CHACHA20+RSA4096을 사용하며 귀하의 키는 이 세상 어느 누구도 사용하지 않습니다. 우리를 제외한 모든 파일을 해독할 수 있습니다. 슈퍼컴퓨터를 사용해도 파일을 해독할 수 없습니다. 어떻게 하면 $5,000 상당의 XMR을 지불해야 합니까? 파일을 해독하려면 Google에서 모네로 가상 화폐를 검색하면 해당 가격과 가상 화폐 거래 방법을 확인할 수 있습니다. 이메일을 보낼 수 있는 기회는 7번뿐이므로 우리와 흥정하려고 하지 마세요. 전혀 도움이 되지 않지만 우리를 짜증나게 할 뿐입니다. 7일 이내에 거래를 완료하지 않으면 우리는 귀하의 키를 삭제하고 모든 파일을 공개할 것입니다. 물론 우리에게 보낼 수 있습니다! 3MB 미만의 파일 3개, 암호 해독이 완료되면 이메일을 보낼 때 제공한 주소로 XMR을 보내주십시오. 귀하의 요청을 받은 후 키와 거래 기록을 함께 보내주십시오. 24시간 안에 행복한 삶을 기원합니다!
이메일: cos.luise@gmx.com
XMR 주소: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
귀하의 RSA 공개 키:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----귀하의 rsa 개인 키: 맨 아래로 당겨.열쇠 보기
我的朋友,你好!我们已将你电脑文件全部加密,请不要使用杀毒软件,否则你的文件将永远无法找回.加密算法采用CHACHA20+RSA4096,你的钥匙采用RSA16384加密.这个世界上除了我们可以解密你的文件以外,其他任何人都无法解密已经加密的文件.就算你使用超级计算机也无法解密文件.怎么找回文件?你必须向我们支付价值5000美元的XMR,才可以解密你的文件.你可以谷歌搜索门罗虚拟货币,然后你就可以看到它的价格以及如何交易虚拟货币.你只有7次向我们发送邮件的机会,你不要尝试和我们讨价还价,这样做对你没有一点帮助,反而只会激怒我们.如果你在7天内没有完成交易,我们会删除你的钥匙并且把你的文件全部公开!当然,你可以向我们发送3个小于3MB的文件,我们会为你免费解密,解密完成以后,请你把XMR发送到我们提供的地址.发送邮件的时候把你的钥匙和你的交易记录一起发送给我们,我们接到你的请求以后,我们会在24小时内完成你的请求.祝你生活幸福!
我们的邮箱:cos.luise@gmx.com
我们的XMR地址:48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
你的RSA公匙:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----你的RSA私匙:到下面,查看你的钥匙
olá, meu amigo! encriptamos todos os ficheiros do seu computador. Por favor, não utilize software antivírus, caso contrário os seus ficheiros nunca serão recuperados. o algoritmo de encriptação utiliza CHACHA20+RSA4096 e a sua chave é encriptada utilizando RSA16384. neste mundo, ninguém pode desencriptar os seus ficheiros, exceto nós. Mesmo que utilize um supercomputador, não conseguirá desencriptar os ficheiros. como recuperar os ficheiros? deve pagar-nos $5.000 em XMR para desencriptar os seus ficheiros. pode pesquisar a moeda virtual monero no google e ver o seu preço e como negociar moeda virtual. só tem 7 hipóteses de nos enviar e-mails, por isso não tente negociar connosco, vai ser mau para si, não ajuda em nada, mas só nos vai irritar. Se não concluir a transação no prazo de 7 dias, eliminaremos a sua chave e tornaremos todos os seus ficheiros públicos! claro, pode enviar-nos 3 ficheiros com menos de 3 MB e nós iremos desencriptá-los gratuitamente. Após a conclusão da desencriptação, envie o XMR para o endereço que fornecemos. ao enviar um e-mail, envie-nos a sua chave e o seu registo de transações em conjunto. depois de recebermos o seu pedido, concluiremos o seu pedido dentro de 24 horas. desejo-lhe uma vida feliz!
o nosso e-mail: cos.luise@gmx.com
o nosso endereço XMR: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
a sua chave pública rsa:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----a sua chave privada rsa: Vá para o fundo para verificar suas chaves
สวัสดีเพื่อนของฉัน! เราได้เข้ารหัสไฟล์คอมพิวเตอร์ของคุณทั้งหมดแล้ว กรุณาอย่าใช้ซอฟต์แวร์ป้องกันไวรัส ไม่เช่นนั้นไฟล์ของคุณจะไม่ถูกกู้คืน อัลกอริธึมการเข้ารหัสใช้ CHACHA20+RSA4096 และคีย์ของคุณถูกเข้ารหัสโดยใช้ RSA16384 ในโลกนี้ไม่มีใครสามารถถอดรหัสไฟล์ของคุณได้ยกเว้นเรา แม้ว่าคุณจะใช้ซูเปอร์คอมพิวเตอร์ คุณจะไม่สามารถถอดรหัสไฟล์ได้ จะรับไฟล์กลับได้อย่างไร? คุณต้องจ่ายเงิน XMR มูลค่า 5,000 ดอลลาร์ให้เราเพื่อถอดรหัสไฟล์ของคุณ คุณสามารถค้นหาสกุลเงินเสมือน monero บน Google จากนั้นคุณจะเห็นราคาและวิธีแลกเปลี่ยนสกุลเงินเสมือน คุณมีโอกาสเพียง 7 ครั้งที่จะส่งอีเมลถึงเรา ดังนั้นอย่าพยายามต่อรองกับเรา มันจะไม่ดีสำหรับคุณ มันไม่ได้ช่วยอะไรเลย แต่จะทำให้เราหงุดหงิดเท่านั้น หากคุณไม่ทำธุรกรรมให้เสร็จสิ้นภายใน 7 วัน เราจะลบรหัสของคุณและทำให้ไฟล์ทั้งหมดของคุณเป็นแบบสาธารณะ! แน่นอน คุณสามารถส่งไฟล์ 3 ไฟล์ที่มีขนาดเล็กกว่า 3mb มาให้เรา และเราจะถอดรหัสมันฟรี หลังจากการถอดรหัสเสร็จสิ้น โปรดส่ง XMR ไปยังที่อยู่ที่เราให้ไว้ เมื่อส่งอีเมล โปรดส่งรหัสและบันทึกการทำธุรกรรมของคุณมาให้เราด้วยกัน หลังจากที่เราได้รับคำขอของคุณ เราจะดำเนินการตามคำขอของคุณให้เสร็จสิ้นภายใน 24 ชั่วโมง ฉันขอให้คุณมีชีวิตที่มีความสุข!
อีเมลของเรา: cos.luise@gmx.com
ที่อยู่ XMR ของเรา: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
รหัสสาธารณะ rsa ของคุณ:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----รหัสส่วนตัว rsa ของคุณ: ตรวจสอบกุญแจของคุณที่ด้านล่าง
שלום, ידידי! הצפנו את כל קבצי המחשב שלך. נא לא להשתמש בתוכנת אנטי וירוס, אחרת הקבצים שלך לעולם לא ישוחזרו. אלגוריתם ההצפנה משתמש ב-CHACHA20+RSA4096, והמפתח שלך מוצפן באמצעות RSA16384. בעולם הזה, אף אחד לא יכול לפענח את הקבצים שלך מלבדנו. גם אם אתה משתמש במחשב על, אתה לא יכול לפענח את הקבצים. איך מחזירים את הקבצים? עליך לשלם לנו XMR בשווי $5,000 כדי לפענח את הקבצים שלך. אתה יכול לחפש מטבע וירטואלי monero בגוגל, ואז אתה יכול לראות את המחיר שלו וכיצד לסחור במטבע וירטואלי. יש לך רק 7 הזדמנויות לשלוח לנו מיילים, אז אל תנסה להתמקח איתנו, זה יהיה רע לך זה לא יעזור בכלל, אלא רק יעצבן אותנו. אם לא תשלים את העסקה תוך 7 ימים, אנו נמחק את המפתח שלך ונהפוך את כל הקבצים שלך לציבוריים! כמובן, אתה יכול לשלוח לנו 3 קבצים פחות מ-3MB, ואנו נפענח אותם בחינם. לאחר השלמת הפענוח, אנא שלח את ה-XMR לכתובת שאנו מספקים. בעת שליחת אימייל, שלח לנו את המפתח שלך ואת רשומת העסקאות שלך יחד. לאחר שנקבל את בקשתך, נשלים את בקשתך תוך 24 שעות. אני מאחל לך חיים מאושרים!
הדוא"ל שלנו: cos.luise@gmx.com
כתובת ה-XMR שלנו: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
מפתח ה-rsa הציבורי שלך:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----מפתח ה-rsa הפרטי שלך: למשוך למטה ולבדוק את המפתח
¡hola mi amigo! Hemos cifrado todos los archivos de su computadora. No utilice software antivirus; de lo contrario, sus archivos nunca se recuperarán. el algoritmo de cifrado utiliza CHACHA20+RSA4096 y su clave se cifra mediante RSA16384. En este mundo, nadie puede descifrar sus archivos excepto nosotros. Incluso si usa una supercomputadora, no podrá descifrar los archivos. ¿Cómo recuperar los archivos? debe pagarnos $5,000 en XMR para descifrar sus archivos. Puede buscar moneda virtual Monero en Google y luego podrá ver su precio y cómo operar con moneda virtual. Sólo tienes 7 oportunidades para enviarnos correos electrónicos, así que no intentes negociar con nosotros, será malo para ti, no ayuda en absoluto, solo nos irritará. Si no completa la transacción dentro de los 7 días, eliminaremos su clave y haremos públicos todos sus archivos. Por supuesto, puedes enviarnos 3 archivos de menos de 3 MB y los descifraremos de forma gratuita. Una vez completado el descifrado, envíe el XMR a la dirección que le proporcionamos. al enviar un correo electrónico, envíenos su clave y su registro de transacción juntos. Después de recibir su solicitud, la completaremos dentro de las 24 horas. ¡Te deseo una vida feliz!
nuestro correo electrónico: cos.luise@gmx.com
nuestra dirección XMR: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
su clave pública rsa:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----su clave privada rsa: Tira hacia abajo y mira la llave
ciao, amico mio! abbiamo crittografato tutti i file del tuo computer. Si prega di non utilizzare software antivirus, altrimenti i file non verranno mai recuperati. l'algoritmo di crittografia utilizza CHACHA20+RSA4096 e la tua chiave viene crittografata utilizzando RSA16384. in questo mondo, nessuno può decrittografare i tuoi file tranne noi. Anche se utilizzi un supercomputer, non puoi decrittografare i file. come recuperare i file? devi pagarci $ 5.000 in XMR per decrittografare i tuoi file. puoi cercare la valuta virtuale monero su Google, quindi puoi vedere il suo prezzo e come scambiare valuta virtuale. hai solo 7 possibilità per inviarci email, quindi non cercare di contrattare con noi, ti farà male, non ti aiuterà affatto, ma ci irriterà solo. Se non completi la transazione entro 7 giorni, elimineremo la tua chiave e renderemo pubblici tutti i tuoi file! ovviamente puoi inviarci 3 file di meno di 3 MB e li decodificheremo gratuitamente. Una volta completata la decrittazione, invia XMR all'indirizzo da noi fornito. quando invii un'e-mail, inviaci insieme la tua chiave e il record della transazione. dopo aver ricevuto la tua richiesta, la completeremo entro 24 ore. ti auguro una vita felice!
la nostra email: cos.luise@gmx.com
il nostro indirizzo XMR: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
la tua chiave pubblica rsa:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----la tua chiave privata rsa: La tua chiave è in fondo
أهلاً يا صديقي! لقد قمنا بتشفير كافة ملفات جهاز الكمبيوتر الخاص بك. يرجى عدم استخدام برامج مكافحة الفيروسات، وإلا فلن يتم استرداد ملفاتك أبدًا. تستخدم خوارزمية التشفير CHACHA20+RSA4096، ويتم تشفير مفتاحك باستخدام RSA16384. في هذا العالم، لا أحد يستطيع فك تشفير ملفاتك إلا نحن. حتى إذا كنت تستخدم جهاز كمبيوتر فائق السرعة، فلن تتمكن من فك تشفير الملفات. كيفية الحصول على الملفات مرة أخرى؟ يجب أن تدفع لنا ما قيمته 5000 دولار من XMR لفك تشفير ملفاتك. يمكنك البحث عن عملة مونيرو الافتراضية على جوجل، ومن ثم يمكنك رؤية سعرها وكيفية تداول العملة الافتراضية. لديك 7 فرص فقط لإرسال رسائل البريد الإلكتروني إلينا، لذا لا تحاول المساومة معنا، سيكون ذلك سيئًا بالنسبة لك ولن يساعدك على الإطلاق، ولكنه لن يؤدي إلا إلى إزعاجنا. إذا لم تقم بإكمال المعاملة خلال 7 أيام، فسنحذف مفتاحك ونجعل جميع ملفاتك عامة! بالطبع، يمكنك أن ترسل لنا 3 ملفات بحجم أقل من 3 ميجابايت، وسنقوم بفك تشفيرها مجانًا. بعد اكتمال فك التشفير، يرجى إرسال XMR إلى العنوان الذي نقدمه. عند إرسال بريد إلكتروني، أرسل لنا مفتاحك وسجل معاملتك معًا. بعد أن نتلقى طلبك، سوف نقوم بإكمال طلبك خلال 24 ساعة. أتمنى لك حياة سعيدة!
ريدنا الإلكتروني: cos.luise@gmx.com
عنواننا XMR: 48hDBzD7J8fMVxcy7J6gTy3tJ3gZDgBgigrzrKVDuK8o2FYbv6CjWeJFU6ar3Mp8oFUtXDZExcoH41wqA1x8cnuVUkbqDai
مفتاح RSA العام الخاص بك:
-----BEGIN PUBLIC KEY-----
*****[REDACTED_ID]*****
-----END PUBLIC KEY-----
Screenshot of Starcat's desktop wallpaper:
Text in the wallpaper:
All files on your computer are encrypted!
Please heck the help documentation on the desktop!
Starcat ransomware removal:
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Video suggesting what steps should be taken in case of a ransomware infection:
Quick menu:
- What is Starcat virus?
- STEP 1. Reporting ransomware to authorities.
- STEP 2. Isolating the infected device.
- STEP 3. Identifying the ransomware infection.
- STEP 4. Searching for ransomware decryption tools.
- STEP 5. Restoring files with data recovery tools.
- STEP 6. Creating data backups.
If you are a victim of a ransomware attack we recommend reporting this incident to authorities. By providing information to law enforcement agencies you will help track cybercrime and potentially assist in the prosecution of the attackers. Here's a list of authorities where you should report a ransomware attack. For the complete list of local cybersecurity centers and information on why you should report ransomware attacks, read this article.
List of local authorities where ransomware attacks should be reported (choose one depending on your residence address):
- USA - Internet Crime Complaint Centre IC3
- United Kingdom - Action Fraud
- Spain - Policía Nacional
- France - Ministère de l'Intérieur
- Germany - Polizei
- Italy - Polizia di Stato
- The Netherlands - Politie
- Poland - Policja
- Portugal - Polícia Judiciária
Isolating the infected device:
Some ransomware-type infections are designed to encrypt files within external storage devices, infect them, and even spread throughout the entire local network. For this reason, it is very important to isolate the infected device (computer) as soon as possible.
Step 1: Disconnect from the internet.
The easiest way to disconnect a computer from the internet is to unplug the Ethernet cable from the motherboard, however, some devices are connected via a wireless network and for some users (especially those who are not particularly tech-savvy), disconnecting cables may seem troublesome. Therefore, you can also disconnect the system manually via Control Panel:
Navigate to the "Control Panel", click the search bar in the upper-right corner of the screen, enter "Network and Sharing Center" and select search result:
Click the "Change adapter settings" option in the upper-left corner of the window:
Right-click on each connection point and select "Disable". Once disabled, the system will no longer be connected to the internet. To re-enable the connection points, simply right-click again and select "Enable".
Step 2: Unplug all storage devices.
As mentioned above, ransomware might encrypt data and infiltrate all storage devices that are connected to the computer. For this reason, all external storage devices (flash drives, portable hard drives, etc.) should be disconnected immediately, however, we strongly advise you to eject each device before disconnecting to prevent data corruption:
Navigate to "My Computer", right-click on each connected device, and select "Eject":
Step 3: Log-out of cloud storage accounts.
Some ransomware-type might be able to hijack software that handles data stored within "the Cloud". Therefore, the data could be corrupted/encrypted. For this reason, you should log-out of all cloud storage accounts within browsers and other related software. You should also consider temporarily uninstalling the cloud-management software until the infection is completely removed.
Identify the ransomware infection:
To properly handle an infection, one must first identify it. Some ransomware infections use ransom-demand messages as an introduction (see the WALDO ransomware text file below).
This, however, is rare. In most cases, ransomware infections deliver more direct messages simply stating that data is encrypted and that victims must pay some sort of ransom. Note that ransomware-type infections typically generate messages with different file names (for example, "_readme.txt", "READ-ME.txt", "DECRYPTION_INSTRUCTIONS.txt", "DECRYPT_FILES.html", etc.). Therefore, using the name of a ransom message may seem like a good way to identify the infection. The problem is that most of these names are generic and some infections use the same names, even though the delivered messages are different and the infections themselves are unrelated. Therefore, using the message filename alone can be ineffective and even lead to permanent data loss (for example, by attempting to decrypt data using tools designed for different ransomware infections, users are likely to end up permanently damaging files and decryption will no longer be possible even with the correct tool).
Another way to identify a ransomware infection is to check the file extension, which is appended to each encrypted file. Ransomware infections are often named by the extensions they append (see files encrypted by Qewe ransomware below).
This method is only effective, however, when the appended extension is unique - many ransomware infections append a generic extension (for example, ".encrypted", ".enc", ".crypted", ".locked", etc.). In these cases, identifying ransomware by its appended extension becomes impossible.
One of the easiest and quickest ways to identify a ransomware infection is to use the ID Ransomware website. This service supports most existing ransomware infections. Victims simply upload a ransom message and/or one encrypted file (we advise you to upload both if possible).
The ransomware will be identified within seconds and you will be provided with various details, such as the name of the malware family to which the infection belongs, whether it is decryptable, and so on.
Example 1 (Qewe [Stop/Djvu] ransomware):
Example 2 (.iso [Phobos] ransomware):
If your data happens to be encrypted by ransomware that is not supported by ID Ransomware, you can always try searching the internet by using certain keywords (for example, a ransom message title, file extension, provided contact emails, crypto wallet addresses, etc.).
Search for ransomware decryption tools:
Encryption algorithms used by most ransomware-type infections are extremely sophisticated and, if the encryption is performed properly, only the developer is capable of restoring data. This is because decryption requires a specific key, which is generated during the encryption. Restoring data without the key is impossible. In most cases, cybercriminals store keys on a remote server, rather than using the infected machine as a host. Dharma (CrySis), Phobos, and other families of high-end ransomware infections are virtually flawless, and thus restoring data encrypted without the developers' involvement is simply impossible. Despite this, there are dozens of ransomware-type infections that are poorly developed and contain a number of flaws (for example, the use of identical encryption/decryption keys for each victim, keys stored locally, etc.). Therefore, always check for available decryption tools for any ransomware that infiltrates your computer.
Finding the correct decryption tool on the internet can be very frustrating. For this reason, we recommend that you use the No More Ransom Project and this is where identifying the ransomware infection is useful. The No More Ransom Project website contains a "Decryption Tools" section with a search bar. Enter the name of the identified ransomware, and all available decryptors (if there are any) will be listed.
Restore files with data recovery tools:
Depending on the situation (quality of ransomware infection, type of encryption algorithm used, etc.), restoring data with certain third-party tools might be possible. Therefore, we advise you to use the Recuva tool developed by CCleaner. This tool supports over a thousand data types (graphics, video, audio, documents, etc.) and it is very intuitive (little knowledge is necessary to recover data). In addition, the recovery feature is completely free.
Step 1: Perform a scan.
Run the Recuva application and follow the wizard. You will be prompted with several windows allowing you to choose what file types to look for, which locations should be scanned, etc. All you need to do is select the options you're looking for and start the scan. We advise you to enable the "Deep Scan" before starting, otherwise, the application's scanning capabilities will be restricted.
Wait for Recuva to complete the scan. The scanning duration depends on the volume of files (both in quantity and size) that you are scanning (for example, several hundred gigabytes could take over an hour to scan). Therefore, be patient during the scanning process. We also advise against modifying or deleting existing files, since this might interfere with the scan. If you add additional data (for example, downloading files/content) while scanning, this will prolong the process:
Step 2: Recover data.
Once the process is complete, select the folders/files you wish to restore and simply click "Recover". Note that some free space on your storage drive is necessary to restore data:
Create data backups:
Proper file management and creating backups is essential for data security. Therefore, always be very careful and think ahead.
Partition management: We recommend that you store your data in multiple partitions and avoid storing important files within the partition that contains the entire operating system. If you fall into a situation whereby you cannot boot the system and are forced to format the disk on which the operating system is installed (in most cases, this is where malware infections hide), you will lose all data stored within that drive. This is the advantage of having multiple partitions: if you have the entire storage device assigned to a single partition, you will be forced to delete everything, however, creating multiple partitions and allocating the data properly allows you to prevent such problems. You can easily format a single partition without affecting the others - therefore, one will be cleaned and the others will remain untouched, and your data will be saved. Managing partitions is quite simple and you can find all the necessary information on Microsoft's documentation web page.
Data backups: One of the most reliable backup methods is to use an external storage device and keep it unplugged. Copy your data to an external hard drive, flash (thumb) drive, SSD, HDD, or any other storage device, unplug it and store it in a dry place away from the sun and extreme temperatures. This method is, however, quite inefficient, since data backups and updates need to be made regularly. You can also use a cloud service or remote server. Here, an internet connection is required and there is always the chance of a security breach, although it's a really rare occasion.
We recommend using Microsoft OneDrive for backing up your files. OneDrive lets you store your personal files and data in the cloud, sync files across computers and mobile devices, allowing you to access and edit your files from all of your Windows devices. OneDrive lets you save, share and preview files, access download history, move, delete, and rename files, as well as create new folders, and much more.
You can back up your most important folders and files on your PC (your Desktop, Documents, and Pictures folders). Some of OneDrive’s more notable features include file versioning, which keeps older versions of files for up to 30 days. OneDrive features a recycling bin in which all of your deleted files are stored for a limited time. Deleted files are not counted as part of the user’s allocation.
The service is built using HTML5 technologies and allows you to upload files up to 300 MB via drag and drop into the web browser or up to 10 GB via the OneDrive desktop application. With OneDrive, you can download entire folders as a single ZIP file with up to 10,000 files, although it can’t exceed 15 GB per single download.
OneDrive comes with 5 GB of free storage out of the box, with an additional 100 GB, 1 TB, and 6 TB storage options available for a subscription-based fee. You can get one of these storage plans by either purchasing additional storage separately or with Office 365 subscription.
Creating a data backup:
The backup process is the same for all file types and folders. Here’s how you can back up your files using Microsoft OneDrive
Step 1: Choose the files/folders you want to backup.
Click the OneDrive cloud icon to open the OneDrive menu. While in this menu, you can customize your file backup settings.
Click Help & Settings and then select Settings from the drop-down menu.
Go to the Backup tab and click Manage backup.
In this menu, you can choose to backup the Desktop and all of the files on it, and Documents and Pictures folders, again, with all of the files in them. Click Start backup.
Now, when you add a file or folder in the Desktop and Documents and Pictures folders, they will be automatically backed up on OneDrive.
To add folders and files, not in the locations shown above, you have to add them manually.
Open File Explorer and navigate to the location of the folder/file you want to backup. Select the item, right-click it, and click Copy.
Then, navigate to OneDrive, right-click anywhere in the window and click Paste. Alternatively, you can just drag and drop a file into OneDrive. OneDrive will automatically create a backup of the folder/file.
All of the files added to the OneDrive folder are backed up in the cloud automatically. The green circle with the checkmark in it indicates that the file is available both locally and on OneDrive and that the file version is the same on both. The blue cloud icon indicates that the file has not been synced and is available only on OneDrive. The sync icon indicates that the file is currently syncing.
To access files only located on OneDrive online, go to the Help & Settings drop-down menu and select View online.
Step 2: Restore corrupted files.
OneDrive makes sure that the files stay in sync, so the version of the file on the computer is the same version on the cloud. However, if ransomware has encrypted your files, you can take advantage of OneDrive’s Version history feature that will allow you to restore the file versions prior to encryption.
Microsoft 365 has a ransomware detection feature that notifies you when your OneDrive files have been attacked and guide you through the process of restoring your files. It must be noted, however, that if you don’t have a paid Microsoft 365 subscription, you only get one detection and file recovery for free.
If your OneDrive files get deleted, corrupted, or infected by malware, you can restore your entire OneDrive to a previous state. Here’s how you can restore your entire OneDrive:
1. If you're signed in with a personal account, click the Settings cog at the top of the page. Then, click Options and select Restore your OneDrive.
If you're signed in with a work or school account, click the Settings cog at the top of the page. Then, click Restore your OneDrive.
2. On the Restore your OneDrive page, select a date from the drop-down list. Note that if you're restoring your files after automatic ransomware detection, a restore date will be selected for you.
3. After configuring all of the file restoration options, click Restore to undo all the activities you selected.
The best way to avoid damage from ransomware infections is to maintain regular up-to-date backups.
Frequently Asked Questions (FAQ)
How was my computer hacked and how did hackers encrypt my files?
Threat actors often spread ransomware through shady websites offering pirated software, cracking tools, or fake technical support. Computers become infected when users download and run ransomware. Ransomware can also be delivered via malicious ads, infected USB drives, outdated software vulnerabilities, P2P networks, compromised websites, and third-party downloaders.
How to open ".starcat" files?
Your files have been encrypted by ransomware. Decryption is necessary to access and use them.
Where should I look for free decryption tools for Starcat ransomware?
In case of a ransomware attack you should check the No More Ransom project website (more information above).
I can pay you a lot of money, can you decrypt files for me?
We do not offer this service. Files encrypted by ransomware are usually impossible to decrypt without the developers' involvement unless the ransomware has flaws. Therefore, any third party offering paid decryption either acts as a man-in-the-middle or is trying to scam you.
Will Combo Cleaner help me remove Starcat ransomware?
Yes, Combo Cleaner will scan your computer and remove active ransomware. However, it is important to note that while antivirus software is crucial for eliminating the ransomware, it cannot decrypt the files that have already been encrypted.
▼ Show Discussion