What it does
Emsisoft Decryptor for Ragnarok is a free tool that attempts to recover files encrypted by the Ragnarok ransomware family. It analyzes the ransomware’s ransom note to reconstruct the encryption details and, when a compatible key is available, decrypts affected files (common extensions: .thor, .hela). Some older variants (e.g., files with extensions .ragnarok or .ragnarok_cry) are not decryptable due to a malware bug.
How to run it safely (step‑by‑step)
- Isolate infected systems: Disconnect the affected PC(s) from networks and external drives to prevent further spread.
- Backup encrypted files: Make a complete copy of encrypted files to a separate offline drive before attempting recovery.
- Download official tool only: Get the decryptor from Emsisoft’s official site (emsisoft.com → Ransomware Decryption → Ragnarok decryptor). Do not use third‑party mirrors unless verifying they link to Emsisoft.
- Scan for active malware: Use a reputable antivirus/antimalware (preferably Emsisoft) to detect and remove the ransomware binary; do not attempt decryption while the malware is actively running.
- Read the decryptor’s limitations: Confirm your file extensions and ransom note match supported variants. If your files use unsupported extensions (see above), decryption may not be possible.
- Run the decryptor:
- Accept the tool’s terms.
- Click Browse and select your ransom note file (the decryptor uses this to reconstruct encryption details).
- If the tool finds needed keys, open the main UI, add drives/folders to decrypt (it pre‑populates connected drives), then click Decrypt.
- Monitor and save logs: When finished, save the log/report for records.
- Verify recovered files: Check several sample files before deleting backups.
- Rebuild and harden: If you must rebuild the system, reinstall OS from trusted media, restore cleaned data, update software, enable backups, and deploy endpoint protection and offline backups.
If decryption fails
- Keep secure offline backups of encrypted files — future updates may succeed.
- Contact Emsisoft support or consult their ransomware decryption pages for updates and submission options.
Important safety notes
- Never pay the ransom (payment doesn’t guarantee recovery and encourages attackers).
- Don’t run unknown executables from attackers or re‑introduce infected files to the system.
- Prefer performing recovery on a clean system or an isolated machine.
(For the official decryptor and detailed usage, see Emsisoft’s Ragnarok decryptor page.)
Leave a Reply