2048 Ransomware Removal Guide

Do you know what2048 Ransomware is?

Failure to protect your Windows operating system can cause permanent damage to your files. 2048 Ransomware is one of the many infections that prove that. This malware invades unguarded operating systems, and then it encrypts files. If it attempts to invade guarded systems, it is removed instantly, which is why securing your system with legitimate anti-malware software is so important. Unfortunately, once files are encrypted, it is possible that you will not be able to get them back, and that is why it is important to have backups. If you have backups stored somewhere outside the infected machine, you are good. First, delete 2048 Ransomware, and then, if you need to, replace the corrupted files. Before you continue reading this report, we want to reiterate that you need to have ALL personal files backed up at ALL times.

Even though 2048 Ransomware is a new threat, it is a clone of other threats that we have reported on our website. Some of them include SySS Ransomware, ROGER Ransomware, Devil Ransomware, and also Dever Ransomware. They are popularly known as Crysis or Dharma Ransomware because these were the original threats, and even security/anti-malware tools might detect 2048 Ransomware as Crysis or Dharma. Of course, regardless of the name, you have to realize that you are dealing with a serious threat. Most likely, it got into your system when you opened a malicious spam email attachment or if you failed to patch system or software vulnerabilities. At first, the threat stays hidden and silent, so that it could encrypt your personal files without notice. Once files are encrypted and the “.id-{code}.[rsa2048@cock.li].2048” extension is attached to the names, you are bound to realize that malware has slithered in.

2048 Ransomware does not leave you guessing about what has happened. It immediately uses a file named “Info.hta” to launch a window entitled “syspentest@aol.com” (it launches automatically after restart as well), and it also drops a file named “FILES ENCRYPTED.txt.” Both of these files must be removed, but you might also be interested by the messages represented via them. According to them, those who want to restore their files – and we are sure that that is everyone – have to email rsa2048@cock.li and 2048rsa@tutanota.com to receive instructions on how to pay the ransom. 2048 Ransomware is identified as “ransomware” because the attackers behind it want to make you pay for a tool that, allegedly, could restore all files. We would not trust the promises of cybercriminals, and so we do not recommend paying the ransom or even contacting the attackers. If you are going to look for free decryptors, note that Dharma and Crysis decryptors exist, but they cannot guarantee complete success. You are guaranteed success only if you have backups.

The manual removal of 2048 Ransomware is a complicated thing because the launcher file has a random name and could be dropped anywhere. Depending on how the threat slithers in, some might find it on the Desktop, while others could find it in the %TEMP% folder. We simply cannot know. If you are up for a challenge, and you are sure you can find the launcher, the manual removal guide below shows how to eliminate the remaining components. If you are not interested in manual removal, install anti-malware software. This is what our researchers recommend doing because once you have this software installed, you will not need to worry about the elimination of threats or the security of your operating system overall.

Delete 2048 Ransomware

  1. Delete the launcher file and the ransom file named FILES ENCRYPTED.txt.
  2. Launch Windows Explorer by simultaneously tapping Win+E keys.
  3. Access these folders (enter into Explorer’s bar at the top) to access and Delete files named Info.hta and {random name}.exe:
    • %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
    • %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\
    • %ALLUSERSPROFILE%\Application Data\Microsoft\Windows\Start Menu\Programs\Startup\
    • %WINDIR%\System32\
    • %APPDATA%\
  4. Launch the Run dialog box by simultaneously tapping Win+R keys.
  5. Launch Registry Editor by entering regedit into the dialog box.
  6. Move to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
  7. Delete all values that point to the malicious Info.hta and {random name}.exe files.
  8. Empty Recycle Bin and then quickly install a trusted malware scanner.
  9. Run a full system scan and delete the leftovers that could be discovered.

In non-techie terms:

2048 Ransomware is a product of cybercriminals, and they are using it to terrorize Windows users. The threat encrypts files and then drops its own files to deliver a message that demands a ransom payment. Even if you cannot use free decryptors or replace your personal files with backups, we do not recommend paying the ransom because it is just too risky. More likely than not, you will give up your savings for no reason at all, and by emailing cybercriminals, you will also expose yourself to new malware attacks. Clearly, we do not advise paying the ransom. To remove 2048 Ransomware, we suggest implementing anti-malware software, but if you want to do it yourself, use the guide above. In the future, make sure you stay away from spam emails, download all updates, implement reliable security software, and also backup all personal files.