What is Thor Ransomware

Thor Ransomware is the newest version of the file-encryption virus. It comes from “Locky” ransomware family, that uses asymmetric cryptography (RSA-2048 and AES-128 encryption algorithms) and appends various file extensions to encrypted files. This family uses names of Thor comics character: .locky, .odin or some other random names. Now it uses .thor extension, and modifies the name to the set of 32 random letters and numbers. Technically, new virus uses same technology, but updated security keys, so old decryptors won’t work. Ransom amount is the same: 3 Bitcoins. Thor Ransomware substitutes desktop background with an image with information about the infection and instructions to pay the ransom. Payment requires Tor browser and uses special anonymous web addresses, which makes it difficult for police to track the hackers. Malware creates 2 files (_WHAT_is.bmp and _WHAT_is.html) and copies them to the folder with encrypted files. First one is used to modify the background, second one contains the same information in HTML format. Below is step-by-step guide to remove Thor ransomware and decrypt .thor files in Windows 10, 8, 7, XP.

Note: Hackers usually do not send any decryptors or decryption keys even if you pay them. Wait until working decryptor appears or try to restore .thor files manually from backup or using instructions below.

thor ransomware virus

How Thor Ransomware infected your PC

Thor like Locky or Odin uses e-mail attachments, with 2 types of files (.zip and .docm). First one uses archived java-script files. Second one uses macros inside the document, that will then download main executable. JavaScript files icons may look like text files and unsuspecting users may click on them. Virus assigns certain ID with the victims, that is used to name those files and to send decryption key. In order to prevent infection with this type of threats in future we recommend you to use SpyHunter 5 and HitmanPro with CryptoGuard.

Download Removal Tool

Download Removal Tool

To remove Thor Ransomware completely, we recommend you to use SpyHunter 5 from EnigmaSoft Limited. It detects and removes all files, folders, and registry keys of Thor Ransomware. The trial version of SpyHunter 5 offers virus scan and 1-time removal for FREE.

Alternative Removal Tool

Download Norton Antivirus

To remove Thor Ransomware completely, we recommend you to use Norton Antivirus from Symantec. It detects and removes all files, folders, and registry keys of Thor Ransomware and prevents future infections by similar viruses.

How to remove Thor Ransomware manually

It is not recommended to remove Thor Ransomware manually, for safer solution use Removal Tools instead.

Thor Ransomware files:


_WHAT_is.html
_WHAT_is.bmp

Thor Ransomware registry keys:


no information

How to decrypt and restore .thor files

Use automated decryptors

kaspersky rannoh decryptor

Thor Ransomware allows user to decrypt 1 file for free. This can be used to attempt and decrypt all files by determining encryption key using this decrypted file and comparing it with encrypted one using special tools. Ransomware decryptor from Kaspersky may be useful in this case. It is free and easy to use. Download Kaspersky Ransomware Decryptor here:

There is no purpose to pay the ransom, because there is no guarantee you will receive the key, but you will put your bank credentials at risk.

If you are infected with Thor ransomware and removed it from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:

Using Windows Previous Versions option:

  1. Right-click on infected file and choose Properties.
  2. Select Previous Versions tab.
  3. Choose particular version of the file and click Copy.
  4. To restore the selected file and replace the existing one, click on the Restore button.
  5. In case there is no items in the list choose alternative method.

Using Shadow Explorer:

  1. Download Shadow Explorer program.
  2. Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
  3. Select the drive and date that you want to restore from.
  4. Right-click on a folder name and select Export.
  5. In case there are no other dates in the list, choose alternative method.

If you are using Dropbox:

  1. Login to the DropBox website and go to the folder that contains encrypted files.
  2. Right-click on the encrypted file and select Previous Versions.
  3. Select the version of the file you wish to restore and click on the Restore button.

How to protect computer from viruses like Thor Ransomware in future

Use Malwarebytes Anti-Ransomware Beta

Famous anti-malware vendor Malwarebytes along with EasySync Solutions created tool that will help you with active anti-ransomware protection as additional shield to your current protection.

Download

Use HitmanPro.Alert with CryptoGuard

Dutch vendor of legendary cloud-based scanner HitmanPro – SurfRight released active antivirus solution HitmanPro.Alert with CryptoGuard feature that effectively protects from latest versions of cryptoviruses.

Download AdGuard
Previous articleHow to remove Web-start.org
Next articleHow to remove Play-bar.net
James Kramer
Hello, I'm James. My website Bugsfighter.com, a culmination of a decade's journey in the realms of computer troubleshooting, software testing, and development. My mission here is to offer you comprehensive, yet user-friendly guides across a spectrum of topics in this niche. Should you encounter any challenges with the software or the methodologies I endorse, please know that I am readily accessible for assistance. For any inquiries or further communication, feel free to reach out through the 'Contacts' page. Your journey towards seamless computing starts here

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here