Free Tools

LockCrypt Ransomware decryption tool

LockCrypt has been around  since mid-2017  with a particular focus on business customers. Spreading by bruteforcing Remote Desktop Protocol credentials, this ransomware family has several sub-variants with the following specific extensions:

  • .1btc     (decryptable and included in this version of the tool)
  • .lock      (decryptable, not included in our tool)
  • .2018    (decryptable, not included in our tool)
  • .bi_d     (not decryptable)
  • .mich    (decryptable, not included in our tool)

The ransom-notes it leaves on the compromised machines may have the following names:

  • ReadMe.txt
  • Restore Files.txt
  • How To Restore Files.txt

The encrypted files are renamed using the ransomware KeyStream and further encoded to Base64 to ensure the charset is acceptable as filename. Any encrypted file also gets the victim ID included as seen below:

Regular expressions for naming the encrypted files:

  • Renaming template: ^[0-9a-zA-Z+/=]+\sid\s[0-9a-zA-Z]{16}\.lock
  • Renaming template: ^[0-9a-zA-Z+/=]+\sid\s[0-9a-zA-Z]{16}\.1btc
  • Renaming template: ^[0-9a-zA-Z+/=]+\sid\s[0-9a-zA-Z]{16}\.2018
  • Renaming template: ^[0-9a-zA-Z+/=]+\sid\s[0-9a-zA-Z]{16}\.bi_d
  • Renaming template: ^[0-9a-zA-Z+/=]+\sid\s[0-9a-zA-Z]{16}\.mich

As seen in Fig. 2 and Fig. 3, the two ransom notes preserve several common aspects between sub-families (including typos) but also have notable differences:

Fig. 2 : [.lock] / ReadMe.txt

Fig. 3 L [.1btc] / Restore Files.TxT

At this point,our removal tool is optimised to decrypt [.1btc] extension only. We hope to add support for the other decryptable versions in the near future. If you got your files encrypted by this sub-version of LockCrypt, please follow the next 4 steps to try to decrypt your files:

Step 1: Download the decryption tool below and save it somewhere on your computer.

Download the LockCrypt decryption tool

This tool does not require an active Internet connection.

Step 2: Double click BDLockCryptDecryptor.exe  and allow it to run elevated at the UAC prompt.

Step 3: Accept the End User License Agreement

Step 4: Select “Scan Entire System” if you want to search for all encrypted files. Alternatively, just add the path to the folder containing the encrypted files.  We strongly recommend that you also select “Backup files” before starting the decryption process, should anything unexpected occur during the decryption process. Start the decryption process by clicking the “Scan” button.

At the end of this step, your files should have been decrypted. The tool generates an operation log in the %temp%\BDRemovalTool\BDRansomDecryptor\BitdefenderLog.txt location.

If you need assistance, contact us at the feedback address listed in the tool. We kindly ask you to attach the above-mentioned log file to help you isolate potential issues and minimize response time.

About the author


Bogdan Botezatu is living his second childhood at Bitdefender as director of threat research. When he is not documenting sophisticated strains of malware or planning removal tools, he teaches extreme sports such as surfing the web without protection or rodeo with wild Trojan horses. He believes that most things in life can be beat with strong heuristics and that antimalware research is like working for a secret agency: you need to stay focused at all times, but you get all the glory when you catch the bad guys.

About the author


Vlad Craciun, Team Lead with the Cyber Threat Intelligence Lab, is one of Bitdefender's crypto experts. Passionate about cryptanalysis and reverse engineering, Vlad runs the ransomware decryption tool program and makes it possible for victims to take their data back without giving in to the bad guys' demands.


Click here to post a comment