This article has been created in order to explain what is the .crypto files virus (Scarab Ransomware) and how to remove it from your computer plus how to restore .crypto files, encrypted by this ransomware infection on your computer.
The .crypto files virus is the type of infection whose primary purpose is to encrypt the files on your computer and set the .crypto file extension as their suffix. The ransomware virus is part of the Scarab ransomware family of viruses. The ransomware aims to use the AES encryption algorithm in order to make the files on your computer to appear corrupt and the virus drops a ransom note, named “HOW TO RECOVER ENCRYPTED FILES.TXT”, which additionally explains how to pay a hefty ransom fee in Bitcoin to the cyber-criminals behind this virus in order to get them to decrypt your files.
|Name||.crypto Scarab Virus|
|Short Description||Encrypts the important files on the infected computer and then asks it’s owner to pay a ransom to retrieve them.|
|Symptoms||Files are appended the .crypto file extension and are no longer openable. Added ransom note, named “HOW TO RECOVER ENCRYPTED FILES.TXT”|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by .crypto Scarab Virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .crypto Scarab Virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.CRYPTO Scarab Ransomware – Update December 2018
The month of December, 2018 brings an update to one of the most nefarious ransomware cryptoviruses of this year. Scarab ransomware with the .crypto extension now has it changed to capital letters, so it is effectively .CRYPTO. The new ransom note is called “HOW TO RECOVER ENCRYPTED FILES.TXT” and is shown in the image below:
The ransom note’s contents remain more or less the same. However, two new email addresses have been left for contacting the cybercriminals. These two emails are the following:
Nothing else seems to have changed, except that the newer variant has been pushed more, in order to infect newer victims with the .CRYPTO extension.
.crypto Scarab Ransomware – How Does It Infect
The primary method of infection, conducted in connection to scarab ransomware has been reported by malware researchers to be e-mail spam messages, which carry malicious e-mail attachments, archived within a .7z archive. The e-mails are similar to a standard spam campaign, sending the Necurs botnet. These e-mails aim to trick you into downloading the malicious attachment, by making it appear as if it is a legitimate one. Here is one e-mail which was detected to carry one of the malicious e-mail attachments of a Scarab ransomware iteration:
In addition to this, the malicious files, related to .crypto Scarab ransomware may contain different types of technologies that can help the virus infect your computer while it is unnoticed. Some of those tools that may be used by this virus are believed to be the following:
- Exploit kits.
- Malicious updates.
- Infected setups.
These tools may be used to spread Scarab .crypto ransomware via other methods as well, besides the standard e-mail spam we have detected so far:
- Via fake installers of programs you may be looking to download.
- Via fake software activators as well as fake cracks and patches.
- Via malicious web links sent via e-mail or posted on social media.
.crypto Scarab Ransomware – Analysis
As soon as infection by this ransomware virus takes place, it immediately becomes evident that the ransomware starts it’s activity. It’s first task is to connect to a command and control server or extract it’s payload on your computer. The payload files of the .crypto files virus may be created in the following system folders of Windows:
In addition to this, the ransomware also drops it’s ransom note, named “HOW TO RECOVER ENCRYPTED FILES.TXT”. As reported by researchers, the ransom note has the following message addressed to the victim:
Warning read this carefully!!!!!!
All your files are encrypted
Your personal identifier
Your documents, photos, databases, save games and other important data were encrypted.
Data recovery requires a decryptor.
To receive the decryptor, you should send an email to the email address: firstname.lastname@example.org.
In the letter, indicate your personal identifier (see the beginning of this document).
Next, you pay the cost of the decryptor. In the reply letter you will receive the address
Bitcoin-purse, to which you need to transfer money.
If you do not have bitcoins you can buy Bitcoin:
https://localbitcoins.com/ru/buy_bitcoins(Visa/MasterCard, QIWI Visa Wallet ….)
Also you can use any convenient way for you to buy bitcoin
When the money transfer is confirmed, you will receive a file decryption for your computer.
After starting the decryption program, all your files will be restored.
* Do not attempt to uninstall the program or run antivirus software
* Attempts to self-decrypt files will result in the loss of your data
* Decoders of other users are incompatible with your data, as each user unique encryption key
After the ransomware drops it’s ransom note file, it may also attack the Windows Registry Editor, where it sets a registry entry in some the following sub –keys:
The reason why the .crypto Files Virus does this is to make it possible for it’s malicious .exe file which is with a random name and located somewhere in the %SystemDrive% folders of Windows, may run automatically when you start Windows.
In addition to modifying the Windows Registry Editor, the Scarab .crypto ransomware may also delete the shadow volume copies on the infected computer. This is achievable if the virus silently runs a script that executes the following command as an administrator on your PC:
.crypto Files Virus – How Does it Encrypt Files
The process of file encryption of this virus is conducted in the same way, like it is with any other version of the Scarab ransomware family. The malware aims to encrypt, using the AES encryption algorithm and it may also use base64 to rename the files and add the .crypto file extension to them. This process results in the files starting to appear, like the following:
The files which are encrypted by this version of Scarab ransomware are usually often used types of files, such as documents, videos, pictures, audio files, archives and others. The .crypto files virus is very careful not to encrypt executables that are crucial for Windows and may damage it’s functionality.
Remove .crypto Files Virus and Try Restoring Your Files
In order to remove this ransomware virus from your computer, we recommend that you follow the removal instructions underneath this article. They are created to help you remove the .crypto files virus either manually or automatically, based on how much experience you have when it comes to malware removal. In addition to this, experts strongly advise that an advanced anti-malware software is the best solution to secure your PC, if it has been infected by the Scarab .crypto variant. Installing such program and scanning your PC with it will also make sure to detect and remove any other malware that may currently reside there as well.
Furthermore, if you want to try and restore files, encrypted by Scarab .crypto ransomware, we recommend that you try using the alternative methods for file recovery underneath this article in step “2. Restore files encrypted by .crypto Scarab Virus”. They have been created in order to help you recover as many encrypted files as possible without having to pay for their decryption and although they are not 100% effective to recover all your files, they are your best alternative bet against this virus.