Remove Rebus (Scarab) Ransomware and Restore .REBUS Files
THREAT REMOVAL

Remove Rebus (Scarab) Ransomware and Restore .REBUS Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Rebus and other threats.
Threats such as Rebus may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

remove-reburs-scarb-ransomware-restore-files-sensorstechforum-com

This article provides information about a version of Scarab data locker ransomware dubbed Rebus. The threat encrypts important files and demands a ransom payment. By reaching the end of the article, you will know how to remove the threat and how to restore .REBUS files.

Rebus is a newly detected ransomware that belongs to the Scarab family. It is classified as data locker ransomware due to its main purpose to locate target files and encode them. Corrupted data can be recognized by the specific extension .REBUS that stands at the end of their names. Hackers behind Rebus ransomware demand a ransom for the decryption of .REBUS files.

Threat Summary

NameRebus
TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware that utilizes AES cihper algorithm to encrypt target files stored on the infected computer. Then it demands a ransom for a specific decryption solution.
SymptomsImportant files are locked and renamed with .REBUS extension. The access to the information they store remains restricted until a ransom is paid.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Rebus

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Rebus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Rebus Ransomware – Distribution

An infection with Rebus ransomware could be triggered by a malicious payload that sneaks into computer systems with the help of various shady techniques of distribution. Preferred by hackers are the email spam campaigns. Crafted emails often attempt to trick users into installing the ransomware directly on their PCs. The malicious components parts of such emails usually are various kinds of file attachments and/or in-text links. To make users more prone to open an attached file or visit a corrupted web page, hackers impersonate representatives of well-known companies or even governmental institutions. In case of interaction with any of the malicious components the ransomware gains access to the system and starts the infection process.

Next time when you need to open a dubious file on your PC you can use a free online extractor to identify whether the file contains malicious elements or not. Once you have this information you could easily prevent severe malware infections like Rebus ransomware from infecting your system.

Rebus (Scarab) Ransomware – Overview

Once Rebus ransomware payload is running on the system it initiates a sequence of changes that affect various system settings. At first, it could create additional malicious files and locate some of them in the following folders:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%
  • %Windows%

As the payload may not contain the commands that will lead the infection to its very end, Rebus may contact its command and control server to drop more needed files and objects. It is likely that some of them are self-destroying so at the end of the attack, only part of all malware files may remain on the system.

The remaining files could be used by hackers to establish a connection with the infected PC and monitor the activities performed on it. Furthermore, they could unnoticeably install another malware and record all keystrokes, steal sensitive credentials or use system resources to mine for any cryptocurrency.

A specific trait of Rebus ransomware is its ransom note that it displays on the PC screen. The note is contained in a file called REBUS RECOVERY INFORMATION.TXT and that is reads is:

=======================================================================================================================

YOUR FILES ARE ENCRYPTED!

Your personal ID
[redacted hex]

Your documents, photos, databases, save games and other important data was encrypted.
Data recovery the necessary decryption tool. To get the decryption tool, should send an email to:
[email protected] or [email protected]
If you dont get reply in 24 hours use jabber:
[email protected]
Letter must include Your personal ID (see the beginning of this document).
In the proof we have decryption tool, you can send us 1 file for test decryption.
Next, you need to pay for the decryption tool.
In response letter You will receive the address of Bitcoin wallet which you need to perform the transfer of funds.
If you have no bitcoins
* Create Bitcoin purse: https://blockchain.info
* Buy Bitcoin in the convenient way
https://localbitcoins.com/ (Visa/MasterCard)
https://www.buybitcoinworldwide.com/ (Visa/MasterCard)
https://en.wikipedia.org/wiki/Bitcoin (the instruction for beginners)
– It doesn’t make sense to complain of us and to arrange a hysterics.
– Complaints having blocked e-mail, you deprive a possibility of the others, to decipher the computers.
Other people at whom computers are also ciphered you deprive of the ONLY hope to decipher. FOREVER.

– Just contact with us, we will stipulate conditions of interpretation of files and available payment,
in a friendly situation
– When money transfer is confirmed, You will receive the decrypter file for Your computer.

Attention!
* Do not attempt to remove a program or run the anti-virus tools
* Attempts to decrypt the files will lead to loss of Your data
* Decoders other users is incompatible with Your data, as each user unique encryption key

=======================================================================================================================

REBUS RECOVERY INFORMATION.TXT ransom note scarab rebus ransomware sensorstechforum com

Negotiations and contacts with hackers should be avoided as they can try to scam you and make you a victim of their malicious intentions for the second time.

Rebus Ransomware – Encryption Process

All initial system modifications are made to support the completion of Rebus’s main purpose which is encryption of target files. For the encryption Rebus is known to utilize the strong AES cipher. This cipher changes completely the original code of predefined types of files including:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

After encryption, all corrupted files have completely changed names that end with the extension .REBUS. The access to the information stored by .REBUS files is restricted as hackers demand a ransom payment for the specific decryption key. The ransomware generates this key during the encryption process. Unfortunately, immediately after this event, the key is transferred to criminals’ host.

Beware that there is no guarantee that the Rebus ransomware has code that enables it to generate working decryption keys. This means that the key possessed by hackers could be broken and unable to decrypt your .REBUS files. So don’t rush into transferring them the ransom before you try to resolve the problem with the help of alternative solutions.

Remove Rebus Ransomware Ransomware and Restore .REBUS Files

The removal of this Scarab ransomware version named Rebus demands a bit of technical experience and ability to recognize characteristics of malware files. And there is no doubt that you should remove this nasty threat from the infected PC as soon as you detect it. Below you could find how to do it step by step. Beware the ransomware is a highly complex threat that is designed to plague your whole system and not only your files. That’s why security researchers recommend the use of an advanced anti-malware tool for its removal. Such tool will keep your system protected against devastating threats like Rebus as well as all other kinds of malware in future.

After you remove the ransomware make sure to check the “Restore Files” step listed in the guide below. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.

Note! Your computer system may be affected by Rebus and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Rebus.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Rebus follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Rebus files and objects
2. Find files created by Rebus on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by Rebus
Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections. She believes that in times of constantly evolving dependency of network connected technologies, people should spread the word not the war.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...