{
	"id": "e1341ee6-ce2f-42cc-a47c-fd8e29685246",
	"created_at": "2026-04-06T01:32:25.504116Z",
	"updated_at": "2026-04-10T03:21:16.259699Z",
	"deleted_at": null,
	"sha1_hash": "e5530a4ba4acea06835e1442c5f7dcf38c2496b3",
	"title": "Free decryptor released for TargetCompany ransomware victims",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3671159,
	"plain_text": "Free decryptor released for TargetCompany ransomware victims\r\nBy Sergiu Gatlan\r\nPublished: 2022-02-07 · Archived: 2026-04-06 00:37:15 UTC\r\nCzech cybersecurity software firm Avast has released a decryption utility to help TargetCompany ransomware victims\r\nrecover their files for free.\r\nHowever, as Avast warns, this decryptor can only be used to restore encrypted files \"under certain circumstances.\"\r\nVictims who want to recover their files using this decrypting tool should also be aware that this will likely be a resource-intensive and time-consuming process.\r\nhttps://www.bleepingcomputer.com/news/security/free-decryptor-released-for-targetcompany-ransomware-victims/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/free-decryptor-released-for-targetcompany-ransomware-victims/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n\"During password cracking, all your available processor cores will spend most of their computing power to find the\r\ndecryption password. The cracking process may take a large amount of time, up to tens of hours,\" Avast said.\r\n\"The decryptor periodically saves the progress and if you interrupt it and restart the decryptor later, it offers you an option to\r\nresume the previously started cracking process.\"\r\nThe TargetCompany ransomware decryptor works by cracking the password after comparing an encrypted file with its\r\noriginal unencrypted version.\r\nAvast says this only has to be done once per each device encrypted by TargetCompany ransomware since the decryptor\r\nwizard will allow you to enter previously cracked encryption passwords by selecting the \"I know the password for\r\ndecrypting files.\"\r\nTargetCompany decryptor (BleepingComputer)\r\nTargetCompany ransomware victims can download the decryption tool from Avast's servers (64-bit or 32-bit) to\r\ndecrypt entire disk partitions using the instructions displayed within the tool's user interface.\r\n\"On the final wizard page, you can opt-in whether you want to backup encrypted files. These backups may help if anything\r\ngoes wrong during the decryption process,\" Avast added.\r\n\"This option is turned on by default, which we recommend. After clicking 'Decrypt,' the decryption process begins. Let the\r\ndecryptor work and wait until it finishes.\"\r\nYou can find additional instructions on how to use Avast's TargetCompany ransomware decryptor here.\r\nTargetCompany is a relatively newly discovered ransomware strain, active since mid-June 2021, that will add a .mallox,\r\n.exploit, .architek, or .brg extension to all encrypted files.\r\nTargetCompany ransomware submissions (ID-Ransomware)\r\nIt also drops a ransom note file named \"HOW TO RECOVER !!.TXT\" in all folders containing encrypted files.\r\nThis happens after it deletes volume shadow copies, reconfigures boot options, and kills processes that could lock databases\r\nof sensitive information (e.g., MySQL, Oracle, SQL Server).\r\nhttps://www.bleepingcomputer.com/news/security/free-decryptor-released-for-targetcompany-ransomware-victims/\r\nPage 3 of 4\n\nAvast also released free decryptors for Babuk, AtomSilo, and LockFile ransomware in October 2021 to allow victims to\r\nrecover their files without paying a ransom.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/free-decryptor-released-for-targetcompany-ransomware-victims/\r\nhttps://www.bleepingcomputer.com/news/security/free-decryptor-released-for-targetcompany-ransomware-victims/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/free-decryptor-released-for-targetcompany-ransomware-victims/"
	],
	"report_names": [
		"free-decryptor-released-for-targetcompany-ransomware-victims"
	],
	"threat_actors": [],
	"ts_created_at": 1775439145,
	"ts_updated_at": 1775791276,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e5530a4ba4acea06835e1442c5f7dcf38c2496b3.pdf",
		"text": "https://archive.orkl.eu/e5530a4ba4acea06835e1442c5f7dcf38c2496b3.txt",
		"img": "https://archive.orkl.eu/e5530a4ba4acea06835e1442c5f7dcf38c2496b3.jpg"
	}
}