- Slow Computer
- System crashes
- Connects to the internet without permission
- Installs itself without permissions
- Can't be uninstalled via Control Panel
Coban Ransomware might belong to the CryptoMix Ransomware family. Consequently, it is quite similar to other malicious programs from the same family, for example, Mole Ransomware, CryptoShield Ransomware, Revenge Ransomware, and so on. According to our computer security specialists who tested the malware, it can lock almost all data located on the infected computer. Thus, it is safe to say the threat is highly malicious and could cause its victims a lot of damage. If you are one of them, we recommend reading the rest of the article and learn more about Coban Ransomware. Users who choose to eliminate the threat should know there will be deletion instructions located at the end of the text to guide them through the removal process. What’s more, if you have any questions you can post a comment just below the instructions.
After entering the system, the infection is supposed to create a couple of executable files called BC0EBCF2F2.exe or similarly in the %ALLUSERSPROFILE% and %ALLUSERSPROFILE%\Application Data directories. Then, Coban Ransomware could add a couple of Registry entries in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce paths. These two Registry entries allow the threat to auto-start with Windows. It means the malware could launch itself automatically every time you turn on the computer. Soon after it is launched, it should start the encryption process, during which it is supposed to lock all data expect the files located in the Windows and Program Files directories. Therefore, after the encryption process, the user might be unable to launch a lot of various files and not just his personal data, for example, photos, pictures, videos, etc.
All encrypted files are not only marked with an additional .coban extension but also renamed. The new title should consist of 32 random letters and numbers, for example, 0AE2C47210495B46345CAE8D130F3F8E.coban. Moreover, once Coban Ransomware finishes locking user’s files, it should drop copies of a text document called _HELP_INSTRUCTION.TXT in most of the directories containing encrypted data. The message inside of it explains that “All your files are already encrypted due to a vulnerability in the system!” It is not completely untrue because the fact the malware was able to get it might mean the computer is not protected enough. It could also mean you might be a bit too careless when it comes to opening email attachments, software, installers, and other data downloaded from the Internet since most of the ransomware applications are distributed through Spam emails, questionable file-sharing web pages, malicious websites, etc.
Furthermore, the mentioned text document or the malware’s ransom note states that “For decoding it is necessary to pay ransom by bitcoins” and asks to contact Coban Ransomware’s creators via email. You should know that it is your choice whether you wish to deal with these people as well as the fact there are no guarantees they will help you even if you pay the ransom. The hackers might just not bother to send you decryption tools, or they could try to extort even more money from you. In other words, if you are not prepared to risk your savings you may have no other option but to live without the encrypted files or wait and hope the volunteer IT specialists manage to create a free decryption tool. Another way to restore data without paying the ransom is to use the copies you could have on cloud storage, removable media devices, social media accounts, and so on.
It is important to know that before attempting to recover encrypted files from backup it is advisable to erase the malicious application first. As you see as long as it is on the system and can launch itself automatically after each restart, there is a possibility it might damage newly added files too. To remove Coban Ransomware manually, you could follow the instructions located below the article. The second option would be to install a reliable antimalware tool and do a full system check-up. After the system is scanned, the tool should allow you to erase any identified threats jus by clicking the provided deletion button. Clearly, this way of removing the malware could be more beneficial since you may get rid of other potential threats too. Plus, if the tool is kept up to date it might be able to protect the computer in the future.
Eliminate Coban Ransomware