Remove Embrace Ransomware - Restore .embrace Files

Remove Embrace Ransomware – Restore .embrace Files

Remove Embrace Ransomware Restore .embrace Files

This article provides information about a ransomware dubbed Embrace that uses an extension of the same name .embrace to mark encrypted files. At the end of it, you will find a step-by-step guide that helps for the removal of this threat as well as alternative ways to recover corrupted files.

Embrace is a newly detected data locker ransomware that targets specific files to encrypt them. With this action, it restricts the access to the information they store. The ransomware is designed to append the extension .embrace to all files it corrupts. As a typical crypto virus, Embrace blackmails victims into paying a ransom for their encrypted files. According to the ransom message associated with the threat, victims should contact hackers at to receive further details on the ransom payment.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionEmbrace ransomware encrypts important files stored on the infected host and then demands a ransom for a decryption key.
SymptomsThe ransomware encrypts your files with strong encryption algorithm. All locked files have the extension .embrace appended at the end of their names. A ransom payment is demanded for their decryption.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Embrace


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Embrace.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Embrace Ransomware – Update December 2018

Update! A decryption tool is now available for this ransomware! The tool was created by the malware researcher Michael Gillespie and can be downloaded from the following link, wrapped inside a .zip archive: Decryption Tool. You need an encrypted file along with its original and the files can be decrypted even if their size is under 10 MB. The decryptor works for the following variants: Insane, desuCrypt, DEUScrypt, .volcano, .Everbe, .pain, .embrace, .Tornado and .twist .

Embrace Ransomware – Distribution

One of the executable files detected to trigger an infection with Embrace ransomware is identified as malicious by 31 antivirus engines of total 65 all listed on VirusTotal website. The distribution of this executable file is likely to happen with the help of several common methods preferred by hackers. The main one is believed to be email spam campaigns. As it allows them to craft email messages in a way that they seem legit and important they often choose it for the spread of their malicious code. Such emails may impersonate representatives of well-known companies or even governmental institutions. The text messages they provide usually attempt to convince you to download and open a file attached to the email or visit a webpage presented as a link in the text.

Malicious attachments that contain the infection code of Embrace ransomware may be presented as documents, invoices, tax payments, delivery receipts, reports and other. In case that you download and open such a corrupted file it lets the ransomware to corrupt your system and data.

For the sake of your security, you could use a free online file extractor before you open new file on your PC. Tools of this kind scan the files you upload for specific malicious traits. So after the scan, you could see whether the uploaded file contains malicious components or not. This information could help you to avoid infections with severe malware like Embrace ransomware.

Embrace Ransomware – Overview

Embrace ransomware is a newly discovered version of Everbe threat that was reported by our team earlier this week.

An infection with Embrace ransomware leads to heavily modified system settings and important data corruption. The attack begins after a payload is triggered on the system. This payload may be designed to create additional malicious files that support the infection process. More malware files may be dropped on the system after a connection between the computer and ransomware command and control server is established.

Malicious files usually are set to modify some essential system settings in order to plague it and ensure the persistent presence of the ransomware. Mostly data locker ransomware like Embrace access the Registry Editor to add some malicious values there. The Registry Editor is a database that stores all low-level settings for the operating system and the installed applications. The functionalities of some of the keys there could be used for the automatic execution of all ransomware files each time the Windows system is started.

At the end of the attack Embrace virus displays a ransom note on the PC screen. It is contained in a file named !=How_recovery_files=!.txt and the message it contains reads:

Hi !

If you want restore your files write on email –
In the subject write – id-*****{CODE}

Do not try to recover data, it’s wasting your time.
Every 7 days the price doubles.

!=How_recovery_files=!.txt ransom note embrace ransomware sensorstechforum

As it appears hackers don’t state the amount of the ransom in the message but instead demand victims to contact them at email address. It is highly recommendable to avoid any negotiations with them as this can only lead to other security issues related to your data and system. Beware that ransom payment doesn’t guarantee the efficient decryption of .embrace files.

Embrace Ransomware – Encryption Process

The primary goal of Embrace ransomware is to utilize strongs cipher algorithm that encodes predefined types of files and restricts the access to them. It is likely that the following files are encrypted by this ransomware:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

After encryption, all corrupted files are renamed with the extension .embrace. It is appended at the end of their original names. There is one more extension that could be placed in front of the last one and it is the contact email left on the ransom note. So encrypted files may look like this one:

locked .[].embrace file Embrace ransomware sensorstechforum removal guide

The information that all these files store is inaccessible until a working files restore solution is applied to them.

Embrace cryptovirus could eliminate one of the possible files restore options by erasing all Shadow Volume Copies from your Windows system. This is hppens after the ransomware executes the following command:

→vssadmin.exe delete shadows /all /Quiet

If a computer device is infected with this ransomware and your files are locked, read on through to find out how you could potentially restore some files back to their normal state.

Remove Embrace Ransomware and Restore .embrace Files

The removal of Embrace ransomware demands a bit of technical experience and ability to recognize characteristics of malware files. And there is no doubt that you should remove this nasty threat from the infected PC as quickly as possible. Below you could find how to do it step by step. Beware that Embrace is a severe threat that is designed to plague your whole system. Security researchers recommend the help of advanced anti-malware tool for maximum efficiency. Such tool further provides future protection against devastating threats like Embrace ransomware as well as all other kinds of malware.

After you remove the ransomware make sure to check the “Restore Files” step listed in the guide below. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share