How to Decrypt and defeat Petya Ransomware

  • Thread starter Thread starter Deleted member 178
  • Start date Start date
D

Deleted member 178

Thread author
Last edited by a moderator:
Yeah good news!

I was trying to figure out how, from the table obtained with the 512 key xor, we can decrypt only the first sector of the MFT encrypted by Petya, in fact, to decrypt the encrypted sectors from following sectors of the MFT it is necessary to know all the other keys.
Having available, however, only a value of 0 table, for me, it was not possible to go back to the Master Table, and consequently to the 32 bytes key.
 
hi guys,anyway i am curious about one thing i didn't think about before.
w10 secure boot didn't prevent petya to install its loader?
thank you
Good question!

Windows 10 uses GPT instead of MBR which contains the boot code and the partition table that Petya uses in its steps to store the malcode.
But even GPT has a master boot record and a partition table, and probably, for how it works, Petya overwrites this GPT data, but without creating a backup copy of it because of the sectors flagged as unused, and in this case it may be impossible to decrypt the HDD.
 
Hello!

i allready tried all guides i found (yours too) but when i feed hack-petya.exe with the .txt files it starts working from 117 down, down, down but never below 91 - then it starts somwhere at 110 again.
i never get a final key.
same problem on key website (its down atm)

please help me!
thank you
 

You may also like...