• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

Qlocker virus. Remove ransomware. Decrypt/Recover encrypted files

Myantispyware team April 29, 2021    

What is Qlocker virus

Qlocker virus is a new malware that belongs to the category of ransomware. Ransomware usually encrypt files, but this malware works differently. It does not encrypt files directly, but archives them with a password. Qlocker virus uses the 7z archiver, so the extension of all infected files is changed to .7z. So, if the file had a name “photo.jpg”, then after encryption its name will change to “photo.7z”, a file with the name “document.docx” will be renamed to “document.7z”, “info.pdf” to “info.7z”, and so on. When all files are encrypted, the virus creates a file named “!!!READ_ME.txt”, which contains the cybercriminals’ demands. To date, it is known that Qlocker targets only QNAP brand Network-attached storage (NAS) devices; security researchers have not found other types of devices infected with this malware.

Qlocker virus

Qlocker virus – ransom note

QUICK LINKS

  • What is Qlocker virus?
  • Qlocker virus removal
  • Recover encrypted files

The ‘!!!READ_ME.txt’ file is a ransom note that is a message from the Qlocker creators. In this message, the criminals report that the victim’s files are encrypted and there is only one way to decrypt them – purchase the key from them. Although the message does not indicate the price of the key, it is usually at least $500, and in some cases reaches several thousand dollars or more. To find out the exact size of the ransom and to decrypt the files, attackers instruct victims to go to the gvka2m4qt5fod2fltkjmdk4gxh5oxemhpgmnmtjptms6fkgfzdd62tad.onion website using the TOR browser. To access this site, victims will need a “Client Key”, which is listed at the bottom of the ‘!!!READ_ME.txt’ file. After entering the key, a page is displayed that states that the value of the key is 0.01 bitcoin, which at the current exchange rate is about $500 (this amount is not fixed, since the bitcoin exchange rate is constantly changing). After paying the ransom (transferring 0.01 bitcoin to the attackers’ account), the victims must enter the transfer ID and submit it. After that, the attackers promise to provide a password to decrypt the encrypted files.

Text presented in the ransom note:

!!! All your files have been encrypted !!!

All your files were encrypted using a private and unique key generated for the computer. This key is stored in our server and the only way to receive your key and decrypt your files is making a Bitcoin payment.

To purchase your key and decrypt your files, please follow these steps:

1. Dowload the Tor Browser at “https://www.torproject.org/”. If you need help, please Google for “access onion page”.

2. Visit the following pages with the Tor Browser:

gvka2m4qt5fod2fltkjmdk4gxh5oxemhpgmnmtjptms6fkgfzdd62tad.onion

3. Enter your Client Key:

While attackers always promise to provide a key or software to decrypt files after paying the ransom, this is not always the case. In some cases, attackers simply ignore victims without sending them the key and decryptor; in other cases, having received the ransom, the attackers increase it, demanding additional payments from the victims. There are also cases when the ransomware contains bugs (flaws), due to which it is impossible to decrypt files at all. Thus, the payment of the ransom turns into a loss of money, the victim’s files remain locked. According to QNAP (the developer of devices affected by the Qlocker virus), it is strongly recommended to immediately download the malware removal utility from the official website (more information can be found in QNAP’s recent response). This tool is used to scan the device, find and remove malware. After scanning, it is recommended to contact the official QNAP Technical Support. It is important not to turn off the QNAP device. Unfortunately, removing Qlocker does not restore affected files; these files remain encrypted. Thus, only those files that the virus did not have time to encrypt remain accessible to the victim.

Qlocker ransomware site

Threat Summary

Name Qlocker virus
Type Crypto virus, Crypto malware, Filecoder, Ransomware, File locker
Files extension .7z (in fact, an encrypted file is a “7z” archive with a password)
Ransom note !!!READ_ME.txt
Cybercriminal Contacts gvka2m4qt5fod2fltkjmdk4gxh5oxemhpgmnmtjptms6fkgfzdd62tad.onion using TOR browser
Symptoms Encrypted personal files. Odd, new or missing file extensions. Files named such as ‘!!!READ_ME.txt’, ‘READ-ME’, ‘_open me’, _DECRYPT YOUR FILES’ or ‘_Your files have been encrypted” in every folder with an encrypted file. Ransom demanding message on your desktop.
Distribution ways Spam or phishing emails that are created to get people to open an attachment or click on a link. Drive-by downloading (when a user unknowingly visits an infected web site and then malware is installed without the user’s knowledge). Social media, such as web-based instant messaging programs. Remote desktop protocol (RDP) hacking.
Removal Ransomwaree removal guide




How to remove Qlocker using the QNAP malware remover

To remove Qlocker virus, it is recommended to use software from the creators of QNAP devices.

Qlocker remover

Qlocker virus remover

  • Log on to QTS as administrator.
  • Open the app store, click on the Search icon.
  • In the search bar, type “Malware Remover” and press Enter. Type “Malware Remover”, and then press ENTER. The Malware Remover application appears in the search result list.
  • Find Malware Remover in the list of found applications, click Install.
  • Open Malware Remover and click Start Scan.
  • Malware Remover scans the NAS for malware.

How to recover ransomware encrypted files

There is a way to recover encrypted files to their original state. No decryption key is required to recover files in this way. Before you begin, you must be 100% sure that the QNAP device does not have active ransomware. Therefore, if you have not yet checked your device for ransomware, do it right now. The last chance to restore encrypted files to their original state is using data recovery tools. We recommend a program called TestDisk. It has all the necessary functions to restore the contents of encrypted files. It helped many victims recover data when it seemed like there was no more hope.

recover files encrypted by Qlocker

Use the steps to recover encrypted files. For more information about the TestDisk tool, read this manual:

Finish words

This guide was created to help all victims of the Qlocker ransomware virus. If you have questions, then write to us, leaving a comment below. If you need more help with Qlocker related issues, go to here.

 

Ransomware

 Previous Post

How to remove Videofileconvertpro.xyz pop-ups (Virus removal guide)

Next Post 

How to uninstall VIPSportSearch from Chrome, Firefox, IE, Edge

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

2 Comments

  1. Tobias Vorwachs
    ― May 2, 2021 - 1:10 pm  Reply

    Thanks for the credit guys…

  2. David
    ― May 7, 2021 - 7:02 pm  Reply

    Not just PhotoRec but best with EaseUS. It at least get some files with names, mainly mp3 files.
    Tried many Data Recovories. Stellar, Get Data Back Nas Data Recovery et al
    Where does one go to see if any geniuses are trying to crack the Qlocker pwd code. Is there a thread on a forum or some other place? Who knows they may crack it sooner than later. Anytime ins better than not at all.

Leave a Reply Cancel reply

New Guides

scam alert
Remove Searchernow.com Redirect: Chrome, Edge, Firefox
Avoid the ExLig.com Bitcoin Scam: Insights on Promo Code Frauds
scam alert
Denwex.com Review: Bitcoin Promo Codes as a Scam
scam alert
CEFOLEX.com Review: A Closer Look at the Bitcoin Promo Code Scam
The Bigexcoin.com Bitcoin Promo Code Scam: How to Stay Safe

Follow Us

Search

Useful Guides

Best free malware removal tools
Best Free Malware Removal Tools 2025
Files encrypted by ransomware become useless
How To Recover Encrypted Files (Ransomware file recovery)
DNSChanger
How to remove DNSChanger malware virus [Updated Apr. 2018]
adwcleaner
AdwCleaner – Review, How to use, Comments
search.yahoo.com
Remove Search.yahoo.com Redirect Virus ✅ (Quick & Easy) in 2024

Recent Guides

Videofileconvertpro.xyz
How to remove Videofileconvertpro.xyz pop-ups (Virus removal guide)
get-money-to.shop
How to remove Get-money-to.shop pop-ups (Virus removal guide)
demetravertando.best
How to remove Demetravertando.best pop-ups (Virus removal guide)
free-money-to.shop
How to remove Free-money-to.shop pop-ups (Virus removal guide)
Demetravertando.bar
How to remove Demetravertando.bar pop-ups (Virus removal guide)

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.