How to Recover Your Multibit Classic Wallet

It is estimated that between 2.78 and 3.79 million BTC have been lost. This can happen when people forget the password they have set to protect their Bitcoin wallets. Indeed, many of these lost Bitcoins are stuck in wallets created by Multibit Classic – a software that was launched in 2011 and that was abandoned in 2017. Multibit Classic was very popular back then and many people used it to store Bitcoins that they had bought at ridiculously low prices (at least by today’s standards).

However, some of these people are tragically locked out of their wealth as they have lost their password. When they try to access their Multibit Classic wallet, they get errors such as:

  • “The wallet password is incorrect”
  • “Could not decrypt bytes”
  • “Could not decrypt input string”
  • “Provided AES key is wrong”

If you are reading this blog post, you probably have tried as many passwords as you could remember, but failed so far. Thankfully, it is possible to automate the process so that you can make more guesses than you ever could by hand. We call this brute forcing. More details below.

Locate the .wallet or .key file to brute force

First of all, we have to locate the Multibit file that we are going to brute force. To do so, open Multibit Classic and select your wallet in the application. In the title bar, you will see the path to the relevant .wallet file. In this example, my wallet is named mybtc.

Screenshot

While we could mount our brute force attack against the .wallet file directly, we ideally want to avoid this. The .wallet file is well protected against such attacks and we will be limited to a few thousands of guesses per second – at most. This is surely better than trying passwords by hand, but it’s suboptimal compared to brute forcing the .key file associated to your wallet: depending on the hardware, we can compute millions, if not billions of passwords per second! The only caveat is that you may not have any .key file.

To find your .key file, go to the path where your .wallet file is supposed to be. There, you should see a folder that starts with your wallet’s name and ends with -data. In my example, it is named mybtc-data. Open it. You should now see four folders:

  • key-backup
  • rolling-backup
  • wallet-backup
  • wallet-unenc-backup

Open the key-backup folder. There should be a file with the following name format: <name of your wallet>-<datetime>.key. In my example, it is named mybtc-20150615120556.key. This is the file that you are going to brute force. If you have multiple .key files, it may be a sign that you protected your wallet with different passwords during its lifetime, though it doesn’t necessarily mean so. It might be worthwhile to try to crack all of them.

If you cannot find any .key file, then you will have to settle for the .wallet file instead.

Crack your password with BTCRecover and hashcat

There are two software that you can use to brute force your wallet: BTCRecover and hashcat. While each one of them has its strengths and weaknesses, they are not so simple that you only have to click on a few buttons and wait for your password to be cracked. In fact, they require you to be somewhat tech savvy. Moreover, you have to be willing to spend hours reading their documentation and searching the web.

I would recommend that you start with BTCRecover as it was designed specifically to crack Bitcoin wallets and has ample documentation. However, it is the slowest of the two software, especially if you are trying to brute force a .key file. On the other hand, hashcat is a versatile and powerful tool with a steeper learning curve and sparser documentation. Speaking of which, if you do use hashcat, you will need the multibit2john.py script to convert your .wallet or .key file into a format it can understand.

My service: I recover Multibit Classic wallets

If the above is too complicated, I offer a service where I recover your Multibit password for you. Here’s what you need to know:

  • I work exclusively on .key files. I can check whether you have such a file or not.
  • I can recover any password that is 7 characters or less. If your password is between 8 and 12 characters, you need to have a fair idea of what you may have used. I’m unlikely to consider your case if you think your password is above 12 characters.
  • I will ask you questions to ascertain that you are the rightful owner of the Multibit wallet you want me to crack.
  • I charge a 15% fee on the recovered Bitcoins. You don’t have to pay me anything if I don’t succeed.

If you would like to get in touch with me, click on the button below: