Delete Odin ransomware (# _HOWDO_text # virus)

Odin extends names of the files encrypted by Locky ransomware. 

The latter used to apply a range of extensions to the affected items. The .odin replaces .zepto, which had been around some three months. Experts observe the infection sticks to quite a precise timing as it introduces new extension every three months. Odin surfaced at the end of September. The preceding version, .Zepto was raging from the end of June and now seems to be off for good. The same applies to other numerous forerunners: they had been in the wild three months until after replaced with the relevant newcomer. Should we expect another round of updates by the Christmas?
After completing its encryption attack, the virus generates a ransom note. It is available in two files called _HOWDO_text.html and _HOWDO_text.bmp. That is another modification the victims may observe. Perhaps, the updates target the victim’s capacity to get relevant recovery and removal advice. The black hats have modified names visible to the unaided eye. Meanwhile, most of the propagation schemes, malicious codes, and communication routes remain unchanged. That is to say, the follow-up is but a recap of a typical Locky attack.

.Odin _HOWDO_text.html

.Odin _HOWDO_text.html

The ransomware is not limited in terms of the infection vectors. Recent reports indicate it rather relies on pretty old school spamming. The spam email simply encourages the reader to open the attachment. It features quite official language and often speaks about critical invoice amendments. Leaping up ahead, that suggests the scammers prefer to hack corporate networks. The ransomware is able to propagate over network shares. If the virus compromises a business network, it is going to demand the ransom from every computer.

Files encrypted by .odin

Files encrypted by .odin

To complete its installation, Odin ransomware spawns a process that involves Rundll32.exe, a native Windows program. That reduces the risk of antivirus terminating the routine. A dormancy period may follow the installation. The trojan abstains from the encryption attack during the span. Such a trick further aggravates its capture by forensics.

Behavior of _HOWDO_text# ransom trojan

The ransomware leverage two stand-alone encryption algorithms. It encodes both names of the files and the files proper. AES-128 applies to process the items and names thereof. The undo the encryption, you would need a key. RSA-2048 system scrambles the key. Even if you intercept one, you cannot use it without the second pin. Anyway, the virus dispatches both to the remote server in two separate messages. It may allow a lag between them, so that even if you manage to get one of them, the other may escape.

.odin wallpaper and encrypted files

.odin wallpaper and encrypted files

Each encrypted data folder receives the ransom note. The note is available as a bmp and HTML file. It redirects the reader to the online page, which is more specific. It is the page that indicates the amount to be paid, as well as the payment method. The ransom is payable in bitcoins. Converted to fiat currency, it makes approximately USD 300. To get rid of Odin ransomware without paying a dime to the crooks, proceed with the guidance available below.

Automated cleanup to remove .odin file extension trojan

Infection vector for ransomware typically features a trojan. The one in question definitely subscribes to that routine. The trojan drops its body into target computer and proceeds with disabling the detecting functionality of any security solution installed. The antivirus is thus unable to spot introduction of virus from the remote server.
The ransomware invasion is indicative of its dropper residing in the computer memory. It also hints at other invasions. The PC can hardly be considered properly protected due to the impacts of the above trojan.
Ultimate option implies a total formatting for any drives of your PC. That is not an option for many users, for it destroys all the data hosted by the machine. The best solution to pick would be in-depth system examination with a reliable security suite.
The trojan that has installed Odin ransomware (_HOWDO_text.bmp or _HOWDO_text.html), unless removed, is to trigger its installation campaign as soon as a new strain of ransomware is available. Thereby, it is critical to kill it as soon as possible.

The technique successfully overcomes malicious software, including any ransoming threats. It deploys a reputable security suite that offers not a single chance for malicious components to avoid detection and extermination. The software is incredibly user-friendly and operates on a single-click basic.

It is good to note the removal of Odin (_HOWDO_text#) ransomware does not recover the data affected. However, the virus is subject to compulsory extermination or else is going to introduce related infections into the machine.

1. Click the button to download the stub installer and go through several setup dialogs. Once the tool is up and running, click Start Computer Scan

2. Wail until the cleaner checks the PC for _HOWDO_text# ransomware files malicious code. As soon as the scan is completed, the report will list all malware objects spotted in the system. Make sure the entries for detected infections are checked, and select the Fix Threats feature. This will result in malware removal and system remediation, so you should now be good to go.

Restore the encrypted files

_HOWDO_text# ransomware encryption is a sophisticated data modification. There is no simple and single solution to cover all the cases. Transferring the ransom as demanded by the crooks is not the way either.Kindly apply the methods outlined below as they have been carefully developed to provide a recovery help for the most severe cases of encrypting assaults.

Data recovery with automatic software

Good news is that the virus actually deals with copies of the files. The originals have been deleted. The removed data still can be restored by virtue of such tools as  Data Recovery Pro.

Shadow Volume Copies

As Windows creates backups at given periods of time, a victim is advised to address relevant restore points. Unfortunately, the method cannot apply unless the System Restore had been enabled prior to the invasion. Please also note the recovery returns files as saved before the time associated with the restore point addressed.

  • Previous Versions dialog to target individual files
    One can open Properties for any file. The menu has a tab called Previous Versions. It indicates versions of a file that have been backed up.
    To make use of the feature, right-click an affected file and choose Properties in the drop-down list. Proceed with clicking the above-mentioned tab. You can opt between the Copy or Restore procedures, the former enabling to copy the item into the location specified by the user.

test properties

shadow explorer

Backups and removing remaining traces of the _HOWDO_text# ransomware

Prevention is the best cure. If you stick to making regular reserve copies of your data and store those outside your operating system, the impacts by the ransomware are very limited. However, prior to copying the data from backups into the system hit by _HOWDO_text# ransomware, make sure the removal of Odin virus has completed.

Your manual removal attempts may kill the ransomware in general. In most of the cases, some remnants manage to survive and are still capable of causing a significant damage. Please apply a reliable anti-malware scanner to detect and remove, if applicable, any remaining infections.

 

Comments
  1. George

Leave a Reply

Your email address will not be published. Required fields are marked *