How to remove DST ransomware

What is DST ransomware

remove DST ransomware

DST is a crypto ransomware that was created by cybercriminals to secretly encrypt frequently crawled files using the AES+RSA algorithm. DST virus adds the extension .dst to encrypted files.
Most often, DST virus infects files such as MS Office documents, OpenOffice, PDF, text files, databases, photos, music, video, image files, archives:

.1gc, .1ua, .1wx, .4d1, .4dd, .aaa, .aac, .abs, .abx, .adb, .ade, .adf, .adn, .adp, .agr, .alf, .ask, .asp, .avi, .bak, .bat, .bmp, .btr, .cat, .cdb, .ckp, .cma, .cmd, .com, .cpd, .cpp, .css, .csv, .dad, .das, .db2, .db3, .dbb, .dbc, .dbf, .dbs, .dbt, .dbv, .dbx, .dcb, .dct, .dcx, .dd1, .dll, .doc, .dp1, .dqy, .dsk, .dsn, .dst, .dwg, .dx1, .eco, .ecx, .edb, .exe, .fcd, .fdb, .fic, .fm5, .fmp, .fo1, .fp3, .fp4, .fp5, .fp7, .fpt, .frm, .gdb, .gif, .gwi, .hdb, .his, .htm, .ibd, .ico, .idb, .ihx, .itw, .jar, .jet, .jpg, .jsp, .jtx, .kdb, .ldf, .m3u, .m4a, .maf, .maq, .mar, .mas, .mav, .maw, .mdb, .mdf, .mdn, .mdt, .mfd, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpd, .mpg, .mrg, .mud, .mwb, .myd, .myi, .ndf, .nnt, .ns2, .ns3, .ns4, .nsf, .nv2, .nyf, .odb, .odt, .ogg, .oqy, .ora, .orx, .owc, .p96, .p97, .pan, .pdb, .pdf, .pdm, .php, .png, .pnz, .ppt, .psd, .qry, .qvd, .rar, .rbf, .rod, .rpd, .rsd, .rtf, .sbf, .scx, .sdb, .sdc, .sdf, .sis, .sln, .spq, .sq1, .sql, .tif, .tmd, .tps, .trc, .trm, .txt, .udb, .udl, .usr, .v12, .vdi, .vhd, .vis, .vpd, .vvv, .wav, .wdb, .wrk, .x1d, .x1s, .xdb, .xls, .xm1, .xm7, .zip (186 расширений).

Next, DST virus creates a text file readme.txt that displays a note where the scammers ask the victim to contact them via an Internet IRC chat to help recover the files:

ALL OF YOUR FILES HAVE BEEN ENCRYPTED !!!!!
[+] Whats Happen? [+]
Your files are now encrypted, and currently unavailable.
By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER) and it will be LEAKED.
[+] What guarantees? [+]
Its just a business. We absolutely do not care about you and your deals, except getting benefits.
If we do not do our work and liabilities – nobody will not cooperate with us. Its not in out interests.
If you will not cooperate with our service – for us, its does not matter. But you will lose your time and data, cause just we have the private key.
In practise – time is much more valuable than money.
[+] How to get access on website? [+]
You have only one ways:
1) [RECOMMENDED] Using TOR Bundle!
a) Download and run TOR Windows Bundle from this site: https://www.torproject.org/download/tor/
b) Download any irc software that supports socks proxy (e.g HexChat
c) Setup tor proxy for irc software ( default host: 127.0.0.1 port 9050
d) Add http://y2cyumvhavcecc6kr5tpat5gdnz2lsw5ucjxbv7s2ggxsh7gj57omuyd.onion/6667 to your network list
e) Set your nickname to nick@hostname
f) Connect and join #support channel
2) If TOR blocked in your country, try to use VPN and try 1)
HERE IS YOUR USERID:f76621de-24cd-4ecf-bfc4-560beef*****
Send it to us for decryption
[*] If you don’t receive a response, wait a while and resend it. [*]

To date, only one method is known for recovering files – it is removing the virus, because while DST virus is in your PC, you will not be able to decrypt files in any way.

Skipped directories:
Program Files (x86), Windows NT, Program Files, Windows Defender, Windows \ security, crypto

Locations:
\ Desktop \ ->
\ User_folders \ ->
\% TEMP% \ ->
/home/atk/Desktop/lock-reless/main.go

There are 2 options for solving this problem. The first is to use an automatic removal utility that will remove the threat and all instances related to it. Moreover, it will save you time. Or you can use the Manual Removal Guide, but you should know that it might be very difficult to remove DST ransomware manually without a specialist’s help.

If for any reason you need to recover deleted or lost files, then check out our article Top 5 Deleted File Recovery Software

DST Removal Guide

Warning alert
Remember that you need to remove DST Ransomware first and foremost to prevent further encryption of your files before the state of your data becomes totally useless. And only after that, you can start recovering your files. Removal must be performed according to the following steps:

  1. Download DST Removal Tool.
  2. Remove DST from Windows (7, 8, 8.1, Vista, XP, 10) or Mac OS (Run system in Safe Mode).
  3. Restore .DST files
  4. How to protect PC from future infections.

How to remove DST ransomware automatically:

NORTON3
Orientation: 1
I want to remove it

Norton is a powerful antivirus that protects you against malware, spyware, ransomware and other types of Internet threats. Norton is available for Windows, macOS, iOS and Android devices. We recommend you to try it.

If you’re Mac user – use this.

Manual DST Removal Guide

Here are step-by-step instructions to remove DST from Windows and Mac computers. Follow these steps carefully and remove files and folders belonging to DST. First of all, you need to run the system in a Safe Mode. Then find and remove needed files and folders.

Uninstall DST from Windows or Mac

Here you may find the list of confirmed related to the ransomware files and registry keys. You should delete them in order to remove virus, however it would be easier to do it with our automatic removal tool. The list:

DST.dll
_readme.txt
readme.txt

Windows 7/Vista:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to DST by using Removal Tool;
  5. Delete found files;

Windows 8/8.1:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to DST by using Removal Tool;
  5. Delete found files;

Windows 10:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to DST by using Removal Tool;
  5. Delete found files;

Windows XP:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to DST by using Removal Tool;
  5. Delete found files;

Mac OS:

  1. Restart the computer;
  2. Press and Hold Shift button, before system will be loaded;
  3. Release Shift button, when Apple DST o appears;
  4. Find programs or files potentially related to DST by using Removal Tool;
  5. Delete found files;

How to restore encrypted files

You can try to restore your files with special tools. You may find more detailed info on data recovery software in this article – recovery software. These programs may help you to restore files that were infected and encrypted by ransomware.

Restore data with Stellar Data Recovery

Stellar Data Recovery is able to find and restore different types of encrypted files, including removed emails.

  1. Download and install Stellar Data Recovery
  2. Choose drives and folders with your data, then press Scan.
  3. Select all the files in a folder, then click on Restore button.
  4. Manage export location. That’s it!
Download Stellar Data Recovery

 

Restore encrypted files using Recuva

There is an alternative program, that may help you to recover files – Recuva.

  1. Run the Recuva;
  2. Follow instructions and wait until scan process ends;
  3. Find needed files, DST them and Press Recover button;

How to prevent ransomware infection?

It is always rewarding to prevent ransomware infection because of the consequences it may bring. There are a lot of difficulties in resolving issues with encoders viruses, that’s why it is very vital to keep a proper and reliable anti-ransomware software on your computer. In case you don’t have any, here you may find some of the best offers in order to protect your PC from disastrous viruses.

Malwarebytes

NORTON3
Orientation: 1
I want to remove it

SpyHunter is a reliable antimalware removal tool application, that is able to protect your PC and prevent the infection from the start. The program is designed to be user-friendly and multi-functional.

Leave a Reply

Your email address will not be published. Required fields are marked *