• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Geek's Advice

IT News, Software Reviews, How To's & Computer Help

  • News
  • Reviews
  • Removal guides
  • Fix
  • Tutorials
  • Forum
  • ASK A GEEK

Remove BOOT Ransomware Virus (2023 Guide)

October 3, 2019 By Norbert Webb 8 Comments

BOOT ransomware virus is a strain of DJVU malware

Contents

  • BOOT ransomware virus is a strain of DJVU malware
    • Beware of additional malware on your system
    • Threat Summary
  • Ransomware distribution tactics
  • BOOT ransomware removal tips

BOOT ransomware virus is a file-encrypting malware from STOP/DJVU ransomware family (v0167). It encrypts all files on victim’s computer and connected cloud accounts using AES/RSA cryptography, making them impossible to open. The malware marks each file with .boot file extension and then creates a ransom note in _readme.txt file, which contains instructions regarding data recovery.

The ransom note left by ransomware developers informs the user that all photos, databases, documents and other files have been encrypted, and the only way to restore them is to pay a ransom in Bitcoin.

The criminals suggest sending some files to them to get them decrypted as a proof of the STOP/DJVU decryption tool’s functionality. There are two contact email addresses provided: gorentos@bitmessage.ch and gerentoshelp@firemail.cc.

remove boot ransomware virus from stop djvu family
The ransom note informs about the encrypted files which can be recognized from modified extensions appended to filenames.

The cybercriminals state ransom price rules same as in previously distributed NESA ransomware variant:

  • If the victim pays within 72 hours after getting files encrypted with .boot file extensions, the ransom price is $490.
  • If the victim fails to pay within 3 days, the ransom price doubles to $980.

The virus typically encrypts all files using ONLINE key (if it manages to connect to its command&control server). However, in some cases it might encrypt some files using OFFLINE key or a combination of both. Speaking of BOOT file decryption, it can be done only on files locked using OFFLINE key. You can also use your data backup to restore encrypted files.

However, in case your personal ID ends with t1, there might be some hope to restore your files because it indicates that files were locked with an OFFLINE key. See the main article about DJVU for decryption details.

In case your files were encrypted with ONLINE key, which is the most common way of encryption since each infected computer typically is connected to network – there are no BOOT decryption tools available.

There are no options to recover .boot file extension data encrypted by the virus using Volume Shadow Copies – the virus deletes them using a command prompt. It also runs these commands to stop particular Windows services and disable recovery options.

sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

Beware of additional malware on your system

The STOP ransomware (also known as DJVU) is known to distribute additional malware called Azorult password-stealing Trojan Several victims have already reported that the attackers managed to steal their passwords and use their financial data illegally.

It is clear that if you want to avoid that, you must remove Boot ransomware virus along with all other threats from your PC immediately. Please follow the instructions given at the end of this article. After that, change all your important passwords (online shops you used recently, other accounts connected to your credit cards) IMMEDIATELY.

_readme.txt ransom note of STOP/DJVU ransomware
Screenshot of the infected computer kindly submitted to us by one of the victims.

Content of the ransom note (_readme.txt or _openme.txt) is shown below.

ATTENTION!

Don’t worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
[removed link]
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.

To get this software you need write on our e-mail:
gorentos@bitmessage.ch

Reserve e-mail address to contact us:
gerentoshelp@firemail.cc

Your personal ID:
0165hTlGeRsMTHVpwDk4Ylm4RWx1y69zcacA5hSp3l60BnYwdby

Boot ransomware note (_readme.txt)

Threat Summary

NameBOOT ransomware virus
TypeRansomware (STOP/DJVU family)
Ransom note_readme.txt, _openme.txt
Ransom price$490-$980
EncryptionAES combined with RSA
DecryptionImpossible; unless an offline key is used.
DistributionMalicious emails, infected downloads
RemovalRemove using antivirus software

Ransomware distribution tactics

Boot ransomware, as well as the whole STOP/DJVU virus variants are known to reach the targets via classic malware distribution channels, such as:

  • Malicious spam;
  • Malicious links;
  • Compromised ad networks;
  • Compromised web pages.
  • Illegal downloads.

Please be very careful when browsing online to avoid unexpected data loss. Cyber criminals are highly professional nowadays and they can obfuscate a malicious file almost without leaving no traces. Resist the temptation to open an interesting e-mail you received but never waited for – it is most likely a trap that will destroy all of your files.

One wrong click on an email attachment or malicious link can turn all your files useless, so please be extremely attentive what you open when browsing the world wide web. We suggest reading these ransomware prevention guidelines.

BOOT ransomware removal tips

You must remove BOOT ransomware virus instantly due to the privacy hazards it causes. Some variants of this malware spreads along with Azorult data-stealing Trojan, so we strongly recommend using a robust malware cleaner – antivirus.

Start Boot ransomware removal using the self-help guide given below. It is extremely important to use an up-to-date antivirus so that it could have this virus’ detection details. Once you get rid of the malware on your computer, start data recovery using a backup you have. If you don’t, there may be no ways to restore your files.

If that’s the case, we still do not encourage you to pay the ransom – cyber criminals aren’t the ones to be trusted, so even after paying you might never get your files back.

OUR GEEKS RECOMMEND

Our team recommends a two-step rescue plan to remove ransomware and other remaining malware from your computer, plus repair caused virus damage to the system:

STEP 1. REMOVE AUTOMATICALLY WITH ROBUST ANTIVIRUS

REMOVE & PROTECT WITH INTEGO

Get INTEGO ANTIVIRUS for Windows to remove ransomware, Trojans, adware and other spyware and malware variants and protect your PC and network drives 24/7. This VB100-certified security software uses state-of-art technology to provide protection against ransomware, Zero-Day attacks and advanced threats, Intego Web Shield blocks dangerous websites, phishing attacks, malicious downloads and installation of potentially unwanted programs.

Use INTEGO Antivirus to remove detected threats from your computer.

Read full review here.

STEP 2. REPAIR VIRUS DAMAGE TO YOUR COMPUTER

DOWNLOAD RESTORO

RESTORO provides a free scan that helps to identify hardware, security and stability issues and presents a comprehensive report which can help you to locate and fix detected issues manually. It is a great PC repair software to use after you remove malware with professional antivirus. The full version of software will fix detected issues and repair virus damage caused to your Windows OS files automatically.

RESTORO uses AVIRA scanning engine to detect existing spyware and malware. If any are found, the software will eliminate them.

Read full review here.

GeeksAdvice.com editors select recommended products based on their effectiveness. We may earn a commission from affiliate links, at no additional cost to you. Learn more.

BOOT ransomware Removal Guidelines

Method 1. Enter Safe Mode with Networking

Step 1. Start Windows in Safe Mode with Networking

Before you try to remove the virus, you must start your computer in Safe Mode with Networking. Below, we provide the easiest ways to boot PC in the said mode, but you can find additional ones in this in-depth tutorial on our website – How to Start Windows in Safe Mode. Also, see a video tutorial on how to do it:

Instructions for Windows XP/Vista/7 users

  1. First of all, turn off your PC. Then press the Power button to start it again and instantly start pressing F8 button on your keyboard repeatedly in 1-second intervals. This launches the Advanced Boot Options menu.
  2. Use arrow keys on the keyboard to navigate down to Safe Mode with Networking option and press Enter.
    Remove ransomware using Safe Mode with Networking

Instructions for Windows 8/8.1/10 users

  1. Open Windows Start menu, then press down the Power button. On your keyboard, press down and hold the Shift key, and then select Restart option.Hold Shift and click Restart to enter Windows Troubleshooting menu
  2. This will take you to Windows Troubleshoot screen. Choose Troubleshoot > Advanced Options > Startup Settings > Restart. Tip: If you can't find Startup Settings, click See more recovery options.Tutorial on how to enable Safe Mode in Windows 10,8,8.1
  3. In Startup Settings, press the right key between F1-F9 to enter Safe Mode with Networking. In this case, it is the F5 key.Choose Windows Safe Mode type by pressing the right function key
Step 2. Remove files associated with the virus

Now, you can search for and remove BOOT ransomware files. It is very hard to identify files and registry keys that belong to the ransomware virus, Besides, malware creators tend to rename and change them repeatedly. Therefore, the easiest way to uninstall such type of a computer virus is to use a reliable malware removal program. In addition, we suggest trying a combination of INTEGO Antivirus (removes malware and protects your PC in real-time) and RESTORO (repairs virus damage to Windows OS files).

GET 75% OFF INTEGO ANTIVIRUS FOR WINDOWS

Method 2. Use System Restore

In order to use System Restore, you must have a system restore point, created either manually or automatically.

Step 1. Boot Windows in Safe Mode with Command Prompt

Instructions for Windows XP/Vista/7 users

  1. Shut down your PC. Start it again by pressing the Power button and instantly start pressing F8 button on your keyboard repeatedly in 1-second intervals. You will see Advanced Boot Options menu.
  2. Using arrow keys on the keyboard, navigate down to Safe Mode with Command Prompt option and press Enter.
    Starting Windows in Safe Mode with Command Prompt

Instructions for Windows 8/8.1/10 users

  1. Launch Windows Start menu, then click the Power button. On your keyboard, press down and hold the Shift key, and then choose Restart option with the mouse cursor.Hold Shift and click Restart to enter Windows Troubleshooting menu
  2. This will take you to Windows Troubleshoot screen. Choose Troubleshoot > Advanced Options > Startup Settings > Restart. Tip: If you can't find Startup Settings, click See more recovery options.Tutorial on how to enable Safe Mode in Windows 10,8,7
  3. In Startup Settings, press the right key between F1-F9 to enter Safe Mode with Command Prompt. In this case, press F6 key.Choose Windows Safe Mode type by pressing the right function key
Step 2. Start System Restore process
  1. Wait until system loads and command prompt shows up.
  2. Type cd restore and press Enter, then type rstrui.exe and press Enter. Or you can just type %systemroot%system32restorerstrui.exe in command prompt and hit Enter.
    Start system restore from command prompt using these commands
  3. This launches System Restore window. Click Next and then choose a System Restore point created in the past. Choose one that was created before ransomware infection.Choose system restore point created before ransomware infection
  4. Click Yes to begin the system restoration process.

After restoring the system, we recommend scanning the system with antivirus or anti-malware software. In most cases, there won't be any malware remains, but it never hurts to double-check. In addition, we highly recommend checking ransomware prevention guidelines provided by our experts in order to protect your PC against similar viruses in the future.

Alternative software recommendations

Malwarebytes Anti-Malware

Removing spyware and malware is one step towards cybersecurity. To protect yourself against ever-evolving threats, we strongly recommend purchasing a Premium version of Malwarebytes Anti-Malware, which provides security based on artificial intelligence and machine learning. Includes ransomware protection. See pricing options and protect yourself now.

get malwarebytes premium

System Mechanic Ultimate Defense

If you're looking for an all-in-one system maintenance suite that has 7 core components providing powerful real-time protection, on-demand malware removal, system optimization, data recovery, password manager, online privacy protection and secure driver wiping technology. Therefore, due to its wide-range of capabilities, System Mechanic Ultimate Defense deserves Geek's Advice approval. Get it now for 50% off. You may also be interested in its full review.

Disclaimer. This site includes affiliate links. We may earn a small commission by recommending certain products, at no additional cost for you. We only choose quality software and services to recommend.

This article was first published on September 29, 2019 and updated on October 3, 2019.

norbert webb author at geeksadvice.com
Norbert Webb

Norbert Webb is the head of Geek’s Advice team. He is the chief editor of the website who controls the quality of content published. The man also loves reading cybersecurity news, testing new software and sharing his insights on them. Norbert says that following his passion for information technology was one of the best decisions he has ever made. “I don’t feel like working while I’m doing something I love.” However, the geek has other interests, such as snowboarding and traveling.

Related posts:

  1. Remove LOKD Ransomware Virus (2021 Decryption Guide) LOKD ransomware comes as the 212th version of STOP/DJVU malwareContentsLOKD...
  2. Remove OOSS Ransomware Virus (2023 Guide) OOSS ransomware hits hard – turns personal files uselessContentsOOSS ransomware...
  3. Remove NOSU Ransomware Virus (2023 Guide) NOSU ransomware blocks access to your own filesContentsNOSU ransomware blocks...

Filed Under: Ransomware, Removal guides Tagged With: DJVU

Reader Interactions

Comments

  1. Sameer Ibrahimiy says

    November 8, 2021 at 9:10 pm

    Thank you for the education it is very helpful
    I was a victim of Ransomware as a result of installing software that turned out to be a virus.
    This one infected my PC and my network hard drive.
    This is the STOP DJVU Ransomware which appends the .RUGJ. extension to all files
    I tested Emsisoft Decryptor (for STOP DJVU, version 1.0.0.5)
    Here is the result :
    Error: No key for New Variant online ID:
    Notice: this ID appears to be an online ID, decryption is impossible
    I deleted _readme.txt from my computer, now I do not know who to contact. What is the solution to open the file, please cooperate
    Thanks very much.

    Reply
  2. Masoud says

    December 17, 2019 at 4:07 am

    Hello mr Webb. Thank you for your guidance.
    My system has been infected with Righ extension. Can you help me please?

    Reply
  3. rakesh says

    October 11, 2019 at 7:46 pm

    Hi Norbert, personal ID ends with t1 in my case, can you please help in how to extract OFFLINE key ?

    Reply
    • Norbert Webb says

      October 11, 2019 at 7:59 pm

      I cannot help to extract it. Only cyber security professionals can and they are currently working on it.

      Reply
  4. Hamid says

    October 8, 2019 at 10:00 pm

    Thank you for the education it is very helpful. But the solution didn’t work for me. I sent one of the encrypted files to them and they decrypted it and sent it back to me. I don’t have the money to pay the Ransome now .
    All my files type has changed to .boot . kindly let me know when there is a solution. Thank you ..

    Reply
    • Norbert Webb says

      October 8, 2019 at 10:07 pm

      Dear Hamid,
      Please check your personal ID. If it ends with t1, you might have a chance to recover some files as soon as the OFFLINE key will be extracted. Otherwise, chances are way lower…

      Reply
  5. antonio candido says

    October 1, 2019 at 5:40 am

    muito obrigado pelas informações, esses otarios merecem apanhar, mas obrigado novamente

    Reply
    • Norbert Webb says

      October 1, 2019 at 5:43 am

      Glad we could help!

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

SEARCH OUR SITE

Trending

decrypt files locked by stop djvu ransomware virus

Decrypt Files Locked by STOP/DJVU Ransomware (Updated 2023 Guide)

Some STOP/DJVU ransomware victims can decrypt or … [Read More...] about Decrypt Files Locked by STOP/DJVU Ransomware (Updated 2023 Guide)

Remove STOP/DJVU Ransomware Virus (2023 Guide)

STOP/DJVU in 2023: more than 670 versions, latest … [Read More...] about Remove STOP/DJVU Ransomware Virus (2023 Guide)

Remove Segurazo Antivirus (SAntivirus Removal Guide 2023)

Segurazo review: is it a virus? Segurazo … [Read More...] about Remove Segurazo Antivirus (SAntivirus Removal Guide 2023)

easy ways to fix dns_probe_finished_nxdomain error on windows, mac, android, chromebook

Fix DNS_PROBE_FINISHED_NXDOMAIN Error (Windows, Mac, Android, Chromebook)

DNS_PROBE_FINISHED_NXDOMAIN error … [Read More...] about Fix DNS_PROBE_FINISHED_NXDOMAIN Error (Windows, Mac, Android, Chromebook)

POPULAR SOFTWARE REVIEWS

Private Internet Access Review

Private Internet Access Review 2023: Fast, Secure & Cheap VPN

Private Internet Access (PIA) VPN maintains its long-term role as a leader Private Internet … [Read More...] about Private Internet Access Review 2023: Fast, Secure & Cheap VPN

restoro review 2020

Restoro Review 2023: Best Windows Repair Tool?

What is Restoro and how it works? Restoro is primarily a PC repair software designed for Windows … [Read More...] about Restoro Review 2023: Best Windows Repair Tool?

INTEGO antivirus review for Mac 2021

Intego Antivirus Review: Best Mac Antivirus in 2023?

Intego Antivirus for Mac is probably the best security choice for OS X Intego Antivirus for Mac … [Read More...] about Intego Antivirus Review: Best Mac Antivirus in 2023?

OUR EXPERTS RECOMMEND

Comprehensive PC Repair Software

geek's advice recommends restoro pc repair as editors choice
DOWNLOAD NOW
  • Uses Avira engine to remove malware
  • Repairs Virus Damage
  • Fixes Windows Errors & BSOD
  • Replaces Damaged DLLs
  • Repairs Damaged Windows Settings
  • Identifies Hardware Problems

Compatible with Microsoft Windows.

Read Full Review

Robust Mac Antivirus

geek's advice recommends intego mac internet security x9 as editors choice
GET INTEGO
  • 24/7 real-time protection
  • Intelligent firewall
  • Scans emails for malware
  • Scans iOS devices & external drives
  • Excellent malware detection rate
  • Easy-to-use

Compatible with Mac OS X 10.9-12.

Read Full Review

Copyright © 2023 Geeksadvice.com. Any unauthorized copying, redistribution or reproduction of part or all of the site contents in any form is prohibited.

About Us · Terms of Use · Privacy Policy · Contact Us