Jokdach ransomware
|

How to remove Jokdach ransomware(.jokdach) and recover your files?

Overview

Jokdach is a file-encrypting ransomware family that appends the .jokdach extension to user files and drops a ransom note named !!!READ_ME!!!.txt. Victims report that previously accessible documents and media become unreadable and are renamed (for example, 1.jpg → 1.jpg.jokdach).

Related article: How to Decrypt Crypz Ransomware (.crypz) files safely?

What Jokdach does to a machine?

Jokdach scans reachable drives and encrypts target files with a strong symmetric cipher, then leaves a text ransom demand. The infection both locks files and attempts to ensure recovery is difficult without the attackers’ decryption key.

Also read: How to Remove WhiteLock Ransomware (.whitelock) and Recover Data?

Removal and containment

Follow these containment and cleanup steps immediately — use bullets for the action list for clarity:

  • Isolate the affected host: from the network (physically disconnect or disable networking).
  • Preserve forensic evidence: do not power off the machine if live memory or volatile data is needed for investigation. Capture memory and disk images if possible.
  • Identify and disconnect: other machines showing the same IOCs.
  • Boot to clean media: and run a full AV/anti-malware scan to remove the encryptor and related components. Use reputable tools and ensure signature/engine updates.
  • Reset credentials: for accounts that may have been compromised and rotate secrets.
  • Restore files: from verified, offline backups where available.

Free recovery options

  • Restore from backups: The safest free method is to restore from offline or immutable backups created prior to the infection. Verify backup integrity before returning systems to service.
  • Volume Shadow Copies / local restore points: On older or misconfigured systems, shadow copies may allow file recovery — but modern ransomware often deletes shadow copies; run authoritative forensic checks before attempting restores.

Paid recovery and professional options 

Paid options include engaging incident response (IR) firms or commercial data recovery companies. These providers can:

  • Conduct full forensic containment and eradication.
  • Attempt professional recovery of corrupted or partially encrypted storage.
  • Negotiate or facilitate complex recovery scenarios (but reputable firms will not advise or require payment to criminals).

Step-by-Step Jokdach Recovery Guide with Jokdach Decryptor

Assess the Infection
Identify the encrypted file extension: .jokdach, and confirm the presence of the ransom note file named !!!READ_ME!!!.txt.

Secure the Environment
Disconnect compromised systems immediately and verify that no active encryption processes or malicious scripts are still running.

Engage Our Recovery Team
Provide us with a few encrypted files along with the ransom note so that we can confirm the Jokdach variant in use. Once validated, we will begin analysis and outline a tailored recovery timeline.

Run Our Decryptor
Execute the Jokdach Decryptor tool as an administrator for best results. Ensure that the machine has an active internet connection, since the decryptor communicates securely with our recovery servers.

  • Enter Your Victim ID: Retrieve the unique victim ID from the ransom note and input it into the decryptor interface for accurate decryption.
  • Start the Decryptor: Initiate the recovery process and allow the tool to restore your encrypted files back to their functional state.

Also read: How to remove Prey (.prey35) ransomwar from Windows and servers?

Offline vs Online Decryption Methods

  • Offline Methods: Suitable for highly secure or air-gapped systems. Recovery can be performed using an drive transfer and a trusted bootable environment.
  • Online Methods: Designed for faster restoration and direct expert assistance. These require an encrypted network channel and secure file upload, similar to the Jokdach Decryptor’s online support process.

How encrypted files appear?

Encrypted files keep their original filename and gain the suffix .jokdach. Typical examples:

  • report.docx → report.docx.jokdach
  • photo.png → photo.png.jokdach

Ransom note — what the attackers demand

The ransom note (filename: !!!_READ_ME_!!!.txt) claims AES-256 encryption and contains a unique victim ID plus a demand to pay 0.5 BTC to the wallet bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh. It instructs victims to contact decryption@protonmail.com and threatens permanent destruction of files after 72 hours.

Excerpt from the note:

YOUR FILES HAVE BEEN ENCRYPTED WITH MILITARY-GRADE AES-256!

Your Unique ID: 7496C601295C71D381C5460EE51CB3DF
Files Encrypted: 93
Time Left: 72 HOURS

Send 0.5 BTC to: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
Contact: decryption@protonmail.com

After 72 hours, all your files will be permanently destroyed!
Do not attempt to recover files yourself – this will cause permanent data loss!

Indicators of compromise (IOCs)

Below are the key IOCs you can use to detect a Jokdach incident:

  • File extension: .jokdach
  • Ransom note filename: !!!_READ_ME_!!!.txt
  • Ransom BTC wallet: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
  • Contact email: decryption@protonmail.com
  • Example victim ID format: 32-character hex (e.g., 7496C601295C71D381C5460EE51CB3DF)
  • AV detection names seen on samples: Avast — Win64:MalwareX-gen [Misc]; Combo Cleaner — Generic.Ransom.AE17FA22; ESET — Win64/Filecoder.ADG; Kaspersky — UDS:Trojan.Win64.Generic; Microsoft — Ransom:Win32/Clop.SIB!MTB. 

Typical tactics, techniques and procedures (TTPs)

Jokdach incidents typically follow these broad behaviors:

  1. Initial access & delivery — Phishing emails with malicious attachments, compromised download sites, pirated software installers, or exploit of unpatched apps.
  2. Execution — The payload executes (often from a dropped EXE or script), runs with user privileges and begins file enumeration.
  3. Discovery & credential access — The malware may attempt to discover mapped drives, network shares and reachable backup locations; opportunistic credential theft may be present if additional loaders are bundled.
  4. Encryption — Files are encrypted using a symmetric cipher; metadata and filenames are preserved with the .jokdach suffix.
  5. Extortion — The ransom note is written to disk and (sometimes) shown on the desktop to force victim contact. Attackers demand cryptocurrency (Bitcoin) and threaten file destruction after a deadline.
  6. Persistence & lateral movement — Some samples will try to persist or spread to other hosts on the same network; additional trojans that steal credentials or exfiltrate data may be installed alongside the encryptor.

Tools and components observed

While full forensic unpacking is needed per sample, typical components observed with Jokdach-style infections include:

  • A main encryptor binary (PE/EXE) that performs file discovery and symmetric encryption.
  • Dropper/loader scripts that extract and run the encryptor.
  • Ransom note writer that creates !!!_READ_ME_!!!.txt.
  • Optional secondary payloads: credential stealers, RATs (remote access trojans) or SMB-scanners used for lateral spread.
  • Obfuscation layers in the executable (packing/obfuscation) to hinder static analysis.

Signs and symptoms on an infected system

Victims will notice they cannot open many files; file extensions change to .jokdach. A visible ransom note will be present and, in some cases, desktop wallpaper or persistent windows display the extortion demand. System performance may be affected during large scale encryption.

Data And Stats

Victims by country

Victims by organization type

Timeline

Detection and scanning recommendations

Scan infected and suspected hosts with updated endpoint detection tools. The following detection names have been observed on analyzed samples: Avast Win64:MalwareX-gen, Combo Cleaner Generic.Ransom.AE17FA22, ESET Win64/Filecoder.ADG, Kaspersky UDS:Trojan.Win64.Generic, Microsoft Ransom:Win32/Clop.SIB!MTB. Combine signature scans with behavior monitoring (file modifications, mass renaming) and network monitoring for unusual outbound connections.

Threat summary

  • Name: Jokdach ransomware
  • Type: Crypto-ransomware (file locker)
  • Extension: .jokdach
  • Ransom note: !!!_READ_ME_!!!.txt
  • Demand: 0.5 BTC (wallet: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh)
  • Contact: decryption@protonmail.com

Final recommendations

When facing a Jokdach ransomware incident, the first step is to isolate the infected system and preserve forensic evidence through imaging. If backups are available, they should be restored from verified, offline sources to minimize further damage. In environments where business continuity is critical, organizations are strongly encouraged to engage experienced incident response professionals for guidance. At the same time, systems must be hardened with proper patch management, enforcement of least privilege, reliable endpoint detection, and offline or immutable backups to reduce the chance of reinfection. 

Finally, victims should avoid paying the attackers as their first option; instead, legal and professional counsel should be consulted to determine the safest course of action.


Frequently Asked Questions

Jokdach is a type of crypto-ransomware that encrypts personal and organizational files, appends the .jokdach extension, and demands payment in Bitcoin for file recovery. Victims also receive a ransom note titled !!!READ_ME!!!.txt.

This ransomware is typically distributed via malicious email attachments, pirated software, drive-by downloads, and compromised websites. It may also exploit unpatched vulnerabilities in operating systems or third-party applications.

Recovery is possible without paying, but it depends on several factors. If you have offline backups, you can restore files. Some victims may recover data from shadow copies or through professional recovery services. However, currently there is no free public decryptor for Jokdach.

Paying the ransom is strongly discouraged. Cybercriminals do not guarantee file recovery after payment, and paying only fuels further attacks. Instead, focus on isolation, cleanup, and using professional recovery solutions.

The first step is to disconnect the device from all networks. Then, use reputable antivirus or anti-malware solutions to scan and remove the ransomware. A full system reinstallation may be necessary for complete assurance that no malicious code remains.

In addition to file encryption, Jokdach infections may deliver secondary payloads such as credential stealers, trojans, or remote access tools. This could compromise sensitive data and allow attackers persistent access to the system.

Keep your operating system and applications updated, run endpoint detection and response (EDR) tools, maintain immutable/offline backups, and educate employees on phishing risks. Avoid downloading software from unverified sources.

Yes, paid professional decryptors are available through security vendors and recovery firms. Our Jokdach Decryptor supports both online and offline modes of recovery, with expert support to guide the process securely.

Yes, if cloud folders or mapped network drives are accessible at the time of infection, they can also be encrypted. This is why having offline backups or cloud backups with versioning is critical.

Organizations should deploy SIEM/EDR solutions capable of detecting the IOCs and TTPs of Jokdach. Monitoring for sudden spikes in file renaming, suspicious outbound connections, or the creation of ransom notes can provide early detection.


Contact Us To Purchase The Jokdach Decryptor Tool

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *