{"id":8363,"date":"2015-04-14T10:00:14","date_gmt":"2015-04-14T14:00:14","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=8363"},"modified":"2019-11-15T23:00:36","modified_gmt":"2019-11-15T12:00:36","slug":"coinvault-ransomware-removal-instruction","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/coinvault-ransomware-removal-instruction\/8363\/","title":{"rendered":"How to remove CoinVault ransomware and restore your files"},"content":{"rendered":"<p>In most cases, if you are a victim of ransomware, there\u2019s nothing you can do. Luckily, from time to time police and cybersecurity companies take down command and control servers of ransomware and retrieve information from them. This information is really useful, because it helps to create decryption tools and to recover users\u2019 files. Recently, Dutch cyber-police and Kaspersky Lab created such a solution for CoinVault victims.<\/p>\n<p>If you want to know more about CoinVault itself, you can read our <a href=\"https:\/\/securelist.com\/blog\/virus-watch\/67699\/a-nightmare-on-malware-street\/\" target=\"_blank\" rel=\"noopener\">detailed report at Securelist<\/a>. If you are interested in exactly how we created a decryption solution, we covered it in a very detailed\u00a0<a href=\"https:\/\/securelist.com\/blog\/69595\/challenging-coinvault-its-time-to-free-those-files\/\" target=\"_blank\" rel=\"noopener\">\u00a0blog post<\/a>. If you are looking for instruction on how to get rid of this ransomware and restore your files, then keep reading below.<\/p>\n<h3>Step 1: Are you infected with CoinVault?<\/h3>\n<p>First, make sure your files are stolen by CoinVault and not by another ransomware. It\u2019s fairly easy to determine: If you are infected with CoinVault, you will see an image like below:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040912\/convault-decryption-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8369\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040912\/convault-decryption-1.jpg\" alt=\"How to remove CoinVault ransomware and restore your files\" width=\"1901\" height=\"1133\"><\/a><\/p>\n<h3>Step 2: Get the Bitcoin wallet address<\/h3>\n<p>In the bottom right of CoinVault you will see the Bitcoin wallet address (it\u2019s marked with a black circle\u00a0on the image above). It\u2019s very important for you to copy and save this address!<\/p>\n<h3>Step 3: Get the encrypted file list<\/h3>\n<p>In the top left corner of the malware window you will see a \u2018View encrypted filelist\u2019 button (it\u2019s marked with blue circle\u00a0on the image above). Click this button and save the output to a file.<\/p>\n<h3>Step 4: Remove CoinVault<\/h3>\n<p>Go to <a href=\"https:\/\/kas.pr\/kismd-cvault\" target=\"_blank\" rel=\"noopener\">https:\/\/kas.pr\/kismd-cvault<\/a> and download the trial version of Kaspersky Internet Security. Install it and it will remove CoinVault from your system. Be sure to save all information retrieved in steps 2 and 3.<\/p>\n<h3>Step 5: Check <a href=\"https:\/\/noransom.kaspersky.com\/?utm_source=KD&amp;utm_medium=text&amp;utm_campaign=kd-com\" target=\"_blank\" rel=\"noopener\">https:\/\/noransom.kaspersky.com<\/a><\/h3>\n<p>At <a href=\"https:\/\/noransom.kaspersky.com\/?utm_source=KD&amp;utm_medium=text&amp;utm_campaign=kd-com\" target=\"_blank\" rel=\"noopener\">https:\/\/noransom.kaspersky.com<\/a> you should enter the Bitcoin wallet address from step 2. If your Bitcoin wallet address is known, the IV and Key will appear on the screen. Please note that multiple keys and IVs may appear. In this case save all the keys and IVs to your computer, you will need them later.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040910\/coinvault-decryption-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8370\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040910\/coinvault-decryption-2.jpg\" alt=\"How to remove CoinVault ransomware and restore your files\" width=\"1280\" height=\"660\"><\/a><\/p>\n<h3>Step 6: Download the decryption tool<\/h3>\n<p>Download the decryption tool at <a href=\"https:\/\/noransom.kaspersky.com\/?utm_source=KD&amp;utm_medium=text&amp;utm_campaign=kd-com\" target=\"_blank\" rel=\"noopener\">https:\/\/noransom.kaspersky.com<\/a> and run it on your computer. If you get an error message, as shown below, go to step 7. If not, skip step 7 and proceed to step 8.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040914\/coinvault-decryption-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8368\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040914\/coinvault-decryption-3.jpg\" alt=\"How to remove CoinVault ransomware and restore your files\" width=\"527\" height=\"260\"><\/a><\/p>\n<h3>Step 7: Download and install additional libraries<\/h3>\n<p>Go to <a href=\"http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=40779\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=40779<\/a> and follow the instructions on the website. Then install the software.<\/p>\n<h3>Step 8: Start the decryption tool<\/h3>\n<p>Start the tool and you will see a screen like\u00a0below:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040915\/coinvault-decryption-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8367\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/04\/06040915\/coinvault-decryption-4.jpg\" alt=\"How to remove CoinVault ransomware and restore your files\" width=\"603\" height=\"311\"><\/a><\/p>\n<h3>Step 9: Test if\u00a0the decryption works properly<\/h3>\n<p>When running the tool for the first time, we strongly advise you to do a test decryption. Do the following:<\/p>\n<ul>\n<li>Click \u201cSelect file\u201d button in the \u201cSingle File Decryption\u201d box and select one file you want to decrypt;<\/li>\n<li>Enter the IV from the webpage into the IV box;<\/li>\n<li>Enter the key from the webpage into the key box;<\/li>\n<li>Click \u201cStart\u201d button.<\/li>\n<\/ul>\n<p>Verify whether the newly created file is properly decrypted.<\/p>\n<h3>Step 10: Decrypt all files stolen by CoinVault<\/h3>\n<p>If everything was okay in step 9, then you can recover all your files at once. To do that select the file list from step 3, enter IV and key and click start. You can select \u201cOverwrite encrypted file with decrypted contents\u201d if you want.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Recover your files stolen by #CoinVault #ransomware. Free of charge<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FZ963&amp;text=Recover+your+files+stolen+by+%23CoinVault+%23ransomware.+Free+of+charge\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>If you received multiple IVs and keys when you entered your Bitcoin wallet address, please be very careful. At the moment we are not 100% sure where the multiple IVs and keys for one Bitcoin wallet come from. In this case, we strongly recommend leaving the \u201cOverwrite encrypted file with decrypted contents\u201d box unticked. If something goes wrong with the decryption you can try another IV+key pair until the file is successfully decrypted.<\/p>\n<p>If you didn\u2019t receive the IV and key at all, you should wait and check <a href=\"https:\/\/noransom.kaspersky.com\/?utm_source=KD&amp;utm_medium=text&amp;utm_campaign=kd-com\" target=\"_blank\" rel=\"noopener\">https:\/\/noransom.kaspersky.com<\/a>. The investigation is ongoing, and we will add new keys as soon as they are available.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab and the Dutch cyber-police created a tool that restores files encrypted by CoinVault ransomware.<\/p>\n","protected":false},"author":421,"featured_media":8365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2646],"tags":[374,1061,1062,36,772,420,1063],"class_list":{"0":"post-8363","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-bitcoin","10":"tag-coinvault","11":"tag-decryption-tool","12":"tag-malware-2","13":"tag-police","14":"tag-ransomware","15":"tag-securitywithoutborders"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/coinvault-ransomware-removal-instruction\/8363\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/coinvault-ransomware-removal-instruction\/5270\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/coinvault-ransomware-removal-instruction\/5789\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/coinvault-ransomware-removal-instruction\/5896\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/coinvault-ransomware-removal-instruction\/7511\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/coinvault-ransomware-removal-instruction\/8363\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/coinvault-ransomware-removal-instruction\/7345\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/coinvault-ransomware-removal-instruction\/7511\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/coinvault-ransomware-removal-instruction\/8363\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/bitcoin\/","name":"bitcoin"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/8363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=8363"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/8363\/revisions"}],"predecessor-version":[{"id":24786,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/8363\/revisions\/24786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/8365"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=8363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=8363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=8363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}