.prus Ransomware – How to Remove It

.prus Ransomware – How to Remove It

This article will aid you to remove .prus Ransomware. Follow the ransomware removal instructions provided at the end of the article.

.prus Ransomware is one that encrypts your data and demands money as a ransom to get it restored. Files will receive the .prus extension. The .prus Ransomware will leave ransomware instructions as a desktop wallpaper image. Keep on reading the article and see how you could try to potentially recover some of your locked files and data.

Threat Summary

Name.prus Ransomware
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files by placing the .prus extension on the target files on your computer system and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files and leave a ransom note with payment instructions.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .prus Ransomware


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .prus Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.prus Ransomware – Distribution Techniques

The .prus ransomware is a newly discovered strain that is descendant from the RotorCrypt family of viruses. The identified attack campaign has been found in small-sized batches of samples. We anticipate that as the virus starts to infect the target computers a wider range of the distribution types will be used.

One of the main tactics that are widely used by criminals is the use of email phishing messages — they are modeled as notifications that appear as being sent by a well-known company or service. Their body contents can contain links to the virus files or they can be directly attached. In most cases stolen multimedia elements and texts can be stolen from the legitimate variants and to deceive the users.

In many cases the hackers can craft hacker-controlled sites that are hosted on domains that sound similar to well-known portals. They are designed to appear like popular search engines, download portals and other pages. To coerce the visitors into thinking that they are visiting a safe place self-signed security certificates can be added.

.Prus ransomware variants as RotorCrypt malware samples are very likely to be integrated in payload carriers of which there are two main types:

  • Dangerous Documents — The criminals can embed macros that contain the virus installation instructions in documents across all popular file formats: presentations, text documents, databases and spreadsheets. Whenever such a file is opened by the victims a prompt will appear asking them to enable the built-in commands, this will trigger the infection.
  • Application Installers — The virus code can also be made part of application setup files — the criminals will typically target the most popular software types used by end users: system utilities, creativity suites, productivity and office programs and etc.

All of these file types can be spread using file sharing networks such as BitTorrent where both legitimate and pirate software is distributed.

Larger infection campaigns can be distributed to victims via browser hijackers, they are modified plugins made for the most popular web browsers aiming to persuade the users that they are safe. While they are found mostly on the associated repositories using fake developer credentials, they can be found on hacker-made sites as well. Those that are found on the plugin repositories typically post descriptions that promise new features addition, performance optimizations and etc. Whenever they are installed the RotorCrypt ransomware sample will be deployed.

.prus Ransomware – Detailed Analysis

Due to the fact that the .prus ransomware is confirmed as a RotorCrypt sample a detailed code analysis has been made. Upon infection a built-in behavior pattern will be started which depending on the current version will launch a sequence of modules.

So far the confirmed actions are the removal of sensitive user data: system backups, shadow volume copies and restore points. This is done by interacting with the necessary Windows services. This shows that the ransomware can use various types of system modules.

We anticipate that other type of dangerous behavior can be programmed:

  • Windows Registry Changes — The ransomware engine can modify the relevant Registry values that are used both by the operating system and any third-party installed applications. This can lead to serious performance issues to the point of rendering the computers unusable if the virus is not removed from the system. Changed values that are attributed to third-party applications or services can lead to unexpected errors, problems with usability and data loss.
  • Boot Options Change — The other dangerous tactic employed by many RotorCrypt ransomware samples such as .prus is the engine’s ability to install itself as a persistent threat. This means that it will reconfigure the boot options, Registry values and operating system preferences in order to automatically start as soon as the computer is powered on. In most of the cases this will also block access to these places thereby making it impossible to follow the majority of user remoal guides.
  • Additional Payload Delivery — The made .prus RotorCrypt ransomware infections can be used to deliver a wide range of other threats to the victim computers.
  • Security Software Removal — Most advanced virus types are capable of finding out what security software is installed on the victim computers. This includes all popular anti-virus programs, firewalls, intrusion detection systems and virtual machine hosts.

Many virus files are also capable of hijacking user data. This is done primarily in order expose their identities. This procedure is done by a special engine that searches for certain strings such as a person’s name, address, phone number, location and any stored account credentials.

This same component is also capable of harvesting enough data in order to create an unique ID that is to be asssigned to each affected computer. The information that is hijacked in this particular case can be details about the installed hardware components, user settings and operating system conditions.

The .prus ransomware is fully capable of installing a Trojan module that will connect to a hacker-controlled server. This is a secure and persistent connection that allows the hackers to take over control of the affected machines, install other threats and hijack user data.

.prus Ransomware – Encryption Process

Like other popular malware samples the .prus ransomware will launch the encryption engine once all prior modules have finished running. It will probably use a built-in list of target file type extensions which are to be processed by a strong cipher. An example list can include the following data types:

  • Backups
  • Databases
  • Archives
  • Images
  • Music
  • Videos

All affected files are renamed with the .prus extension. A ransomware note will be created in a file called “informprus.txt” alongside a desktop wallpaper that will be applied to to infected computers. As the base engine is modular in nature it can be extended with additional components and behavior patterns.

Remove .prus Ransomware and Try to Restore Data

If your computer system got infected with the .prus ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share