Zilla Ransomware is a Turkish-developed computer malware that is set to encrypt your files. If you were unfortunate enough to have your computer infected with this malware, then you ought to remove it because this program does not offer you to purchase a decryption tool to decrypt your files. It simply encrypts your files and that it is. This particular program targets files formats that hold personal information. Hence, it encrypts documents, pictures, videos, and so on. Once the files have been encrypted, you cannot do anything about it as the encryption method used is very strong and there is no free decryption tool yet.
Our research as revealed that Zilla Ransomware uses the AES encryption algorithm, but its key length is unknown. The AES encryption algorithm offers a very strong encryption, so decrypting it is nearly impossible. However, if it turns out that this program has vulnerabilities that can be exploited and, in turn, the encryption can be cracked, then a free decryption tool is bound to appear. Therefore, until that can happen, the only obvious choice is to delete this ransomware.
We have found that Zilla Ransomware was configured to encrypt file types that include .doc, .jpg, .mp3, .pdf, .png, .pptx, .txt, and .xls. While encrypting your files, this ransomware appends them with a “.zilla” extension. You may notice that this list of file formats includes the most widely used formats for keeping important personal and work-related information. As a result of these file types being encrypted, you may be compelled to pay the ransom. We have found that this ransomware should ask you to pay 0.5 Bitcoins which is an approximate 1,250 US dollars. However, it does not ask you to pay, and there is no ransom note to speak of. Once this ransomware is done encrypting your files, it drops a text file named “OkuBeni.txt.” However, all this file contains are words “Dosyalarınız Şifrelendi!” in the Turkish language which mean “Your Files Are Encrypted!” There is no more information inside this file, so you cannot hope to pay the hefty ransom and get your valuable files back.
Like most ransomware-type computer infections, Zilla Ransomware is disseminated through malicious emails. The developers send this ransomware via email, and we have found that this ransomware targets English speaking countries specifically. However, this does not explain the text file being in Turkish. In any case, the ransomware is probably included in the email as an attached file, and the file name is ConsoleApplication1.exe. We do not know how the email tries to trick users into opening it, but if you do open it without downloading it, then the file will be dropped in %Temp% folder, but if you choose to download it first, then it will probably be placed in %USERPROFILE\Downloads or %USERPROFILE\Desktop.
In summary, Zilla Ransomware is a dangerous computer infection that can render your files inaccessible indefinitely. It seems half finished as its ransom note provides no information on how to get into contact with the developers to pay the ransom and get your files back. Therefore, there is no other alternative but to delete this program and try to recover as many of your files from external drives. We recommend that you use the manual removal guide below, but if you cannot find the executable file of this ransomware, then you should download and antimalware program such as SpyHunter to detect and remove it.