.kes$ Files Virus (Scarab) - Remove It
THREAT REMOVAL

.kes$ Files Virus (Scarab) – Remove It

kes$ ransomware remove

What is Scarab ransomware? Why did .kes$ Files Virus encrypt my files? Can I get files encrypted by the .kes$ Files Virus restored?

Scarab is family of cryptoviruses which aim to encrypt your files and demand money as a ransom to get your files restored. According to some malware researchers, all files of a compromised computer get locked with the AES military grade encryption algorithm. The Scarab cryptovirus will encrypt your data, while also appending the custom .kes$ extension to each of the encrypted files. Read on to see how you could try to potentially recover some of your files.

Threat Summary

Name.kes$ Files Virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer system and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with the AES encryption algorithm. All locked files will have the .kes$ extension appended to them.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .kes$ Files Virus

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .kes$ Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.kes$ Files Virus (Scarab) – More About It

Scarab ransomware with its current variant that appends the .kes$ extension might spread its infection in various ways. A payload dropper which initiates the malicious script for this ransomware is being spread around the Internet. Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Refrain from opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems out of the ordinary. You should read the tips for preventing ransomware located at the corresponding forum thread.

Scarab is a virus that encrypts your files and places a .txt file, with instructions inside the infected computer system. The extortionists want you to pay a ransom fee for the alleged restoration of your files. Every file that gets encrypted will receive the .kes$ or the .kes$ suffix. That suffix is appended to the name of an encrypted file as a secondary extension. The original extension and filenames remain unchanged after encryption, as the .kes$ extension is added.

Scarab ransomware could make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows operating system.

After encryption the Scarab virus shows a ransom message located inside a .txt file.

You can see its contents of this file, labeled HOW TO RECOVER ENCRYPTED FILES.TXT, from the following screenshot given down below:

kes$ ransomware note

The ransom note states the following:

Contact us using this email address: kesoma32@horsefucker.org

*** IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS ***

Your files are now encrypted!
—–BEGIN PERSONAL IDENTIFIER—–
o4QAAAAAAAA***7KtfAw
—–END PERSONAL IDENTIFIER—–
All your files have been encrypted due to a security problem with your PC.
Now you should send us email with your personal identifier.
This email will be as confirmation you are ready to pay for decryption key.
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.
Contact us using this email address: kesoma32@horsefucker.org
reserve email: reserve34@firemail.cc
Free decryption as guarantee!
Before paying you can send us up to 2 files for free decryption.
The total size of files must be less than 2 Mb (non archived), and files should not contain
valuable information (databases, backups, large excel sheets, etc.).

How to obtain Bitcoins?
* The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click
‘Buy bitcoins’, and select the seller by payment method and price:
https://localbitcoins.com/buy_bitcoins
* Also you can find other places to buy Bitcoins and beginners guide here:
http://www.coindesk.com/information/how-can-i-buy-bitcoins


Attention!
* Do not rename encrypted files.
* Do not try to decrypt your data using third party software, it may cause permanent data loss.
* Decryption of your files with the help of third parties may cause increased price
(they add their fee to our) or you can become a victim of a scam.

The note is also in the Russian language in some variants:

kes$ files virus note russian

Напишите на почту – kesoma32@horsefucker.org
====================================
ВАШИ ФАЙЛЫ ЗАШИФРОВАНЫ!
Ваш личный идентификатор
o4QAAAAAAAA***k6h0oQ0
Ваши документы, фотографии, базы данных и другие важные файлы были зашифрованы.
Каждые 24 часа удаляются 24 файла, необходимо прислать свой идентификатор чтоб мы отключили эту функцию.
Каждые 24 часа стоимость расшифровки данных увеличивается на 30% (через 72 часа сумма фиксируется)
Для расшифровки данных:
Напишите на почту – kesoma32@horsefucker.org
*В письме указать Ваш личный идентификатор
*Прикрепите 2 файла до 1 мб для тестовой расшифровки.
мы их расшифруем, в качестве доказательства, что ТОЛЬКО МЫ можем их расшифровать.
-Чем быстрее вы сообщите нам свой идентификатор, тем быстрее мы выключим произвольное удаление файлов.
-Написав нам на почту вы получите дальнейшие инструкции по оплате.
В ответном письме Вы получите программу для расшифровки.
После запуска программы-дешифровщика все Ваши файлы будут восстановлены.
Мы гарантируем:
100% успешное восстановление всех ваших файлов
100% гарантию соответствия
100% безопасный и надежный сервис
Внимание!
* Не пытайтесь удалить программу или запускать антивирусные средства
* Попытки самостоятельной расшифровки файлов приведут к потере Ваших данных
* Дешифраторы других пользователей несовместимы с Вашими данными, так как у каждого пользователя уникальный ключ шифрования
====================================
Ваш личный идентификатор
o4QAAAAAAAA***k6h0oQ0

The note of the Scarab ransomware states that your files are encrypted and that you have to pay a ransom to get them back to normal. However, you should NOT under any circumstances pay any ransom sum. Your files may not get recovered, and nobody could give you a guarantee for that. Adding to that, giving money to cybercriminals will most likely motivate them to create more ransomware viruses or commit different criminal activities. That may even result to you getting your files encrypted once again.

The following e-mail addresses are used for contacting the cybercriminals:

  • kesoma32@horsefucker.org
  • reserve34@firemail.cc

The Scarab cryptovirus deletes all Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

Along with the above-stated command, other ones are executed, which remove backups, making the effects of the encryption process more efficient. Those commands remove some of the viable ways to restore your data via Windows inherent processes. If a computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore some files back to their original state.

Remove .kes$ Files Virus (Scarab Ransomware)

If your computer system got infected with the Scarab ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Tsetso Mihailov

Tsetso Mihailov

Tsetso Mihailov is a tech-geek and loves everything that is tech-related, while observing the latest news surrounding technologies. He has worked in IT before, as a system administrator and a computer repair technician. Dealing with malware since his teens, he is determined to spread word about the latest threats revolving around computer security.

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...