Remove Scarab-Ukrain Ransomware – Restore .ukrain Files
THREAT REMOVAL

Remove Scarab-Ukrain Ransomware – Restore .ukrain Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Scarab (.ukrain) and other threats.
Threats such as Scarab (.ukrain) may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article will help you to remove Scarab ransomware in full. Follow the ransomware removal instructions provided at the end of the article.

Scarab is a virus that encrypts your files and demands money as a ransom to get your files restored. According to some malware researchers, all files of a compromised computer get locked with the AES military grade encryption algorithm. The Scarab cryptovirus will encrypt your data, while also appending the custom .ukrain extension to each of the encrypted files. Keep on reading the article to see how you could try to potentially recover some of your files.

Threat Summary

NameScarab (.ukrain)
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer system and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with the AES encryption algorithm. All locked files will have the .ukrain extension appended to them.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Scarab (.ukrain)

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Scarab (.ukrain).
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.ukrain Files Virus (Scarab) – Distribution Ways

Scarab ransomware might spread its infection in various ways. A payload dropper which initiates the malicious script for this ransomware is being spread around the World Wide Web, and researchers have gotten their hands on a malware sample. If that file lands on your computer system and you somehow execute it – your computer system will become infected.

Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Refrain from opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems out of the ordinary. You should read the tips for preventing ransomware located at the corresponding forum thread.

.ukrain Files Virus (Scarab) – Technical Insight

Scarab is a virus that encrypts your files and places a .txt file, with instructions inside the infected computer system. The extortionists want you to pay a ransom fee for the alleged restoration of your files.

Scarab ransomware could make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows operating system.

After encryption the Scarab virus shows a ransom message located inside a .txt file.

You can see its contents of this file, labeled HOW TO RECOVER ENCRYPTED FILES.TXT, from the following screenshot given down below:

The ransom note is in the Russian language and states the following:

ВАШИ ФАЙЛЫ ЗАШИФРОВАНЫ!

Ваш личный идентификатор
6A020000000000008FF6A8C61D915803008045B0296B3FFC69CE88FCF807B4CAC3DBA6B52E50AAB19D5964EB5DEF1D8B6C5050B937666AA98DCB48AB4946B75DE21EDDDCD78545BF5595DAD75598FA18976CEBA5F9762A2B647BA74B752231BDB578952E6D432AA760F177E8EA1658A0DDB71DBAA892E67B41B2665F12AC9DFA3B643DFDBB2632BAF95A7973E9543269FF6B5B137ACB7BBBEA2ED4CEF5678CAEE966E9E3879DC9CB24150F899E862041B927B0802834776461305B307C7C9B7B61750C938724061B4C6648A5E86DC786B9FC54B10C4A6B58F1CA64024C78DBDB8550FAC39B38C4A43A78FA40714C25542B2A9DD135A07C721F52E2A4AF4C9DC9D0532AEC7CF90E4730EDDBB82193ABEAD5180878CA0A56ABDB601CBE58C9B59CD5F01B5E5BA0F7800667910CAE00F98D0586F0102117DE08D80F3337027EC07

Ваши документы, фотографии, базы данных и другие важные данные были зашифрованы.
Для восстановления данных необходим дешифровщик.
Чтобы получить дешифровщик, следует отправить письмо на электронный адрес [email protected] ([email protected])
В письме укажите Ваш личный идентификатор (см. в начале данного документа).

Далее необходимо оплатить стоимость дешифровщика. В ответном письме Вы получите адрес
Bitcoin-кошелька, на который необходимо выполнить перевод денежных средств и сумму платежа.

Если у Вас нет биткойнов
* Создайте кошелек Bitcoin: https://blockchain.info/ru/wallet/new
* Приобретите криптовалюту Bitcoin:
https://localbitcoins.com/ru/buy_bitcoins (Visa/MasterCard, QIWI Visa Wallet и др.)
* Отправьте требуемое количество BTC на указанный в письме адрес

Когда денежный перевод будет подтвержден, Вы получите дешифровщик файлов для Вашего компьютера.
После запуска программы-дешифровщика все Ваши файлы будут восстановлены.

Гарантия расшифровки файлов.
Перед оплатой вы можете отправить нам до 3х файлов для бесплатной расшифровки.
Они не должны содержать важную информацию, общий размер файлов должен быть не более 10 мб.

Внимание!
* Не пытайтесь удалить программу или запускать антивирусные средства
* Попытки самостоятельной расшифровки файлов приведут к потере Ваших данных
* Дешифраторы других пользователей несовместимы с Вашими данными, так как у каждого пользователя
уникальный ключ шифрования

A machine translation in English is given below:

YOUR FILES ARE ENCRYPTED!

Your personal identifier
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

Your documents, photos, databases and other important data were encrypted.
Data recovery requires a decryptor.
To receive the decryptor, you should send an email to [email protected] ([email protected])
In the letter, indicate your personal identifier (see the beginning of this document).

Next, you pay the cost of the decryptor. In the reply letter you will receive the
Bitcoin-wallet address, to which you need to perform the transfer of funds and the amount of payment.

If you do not have bitcoins
* Create a Bitcoin wallet: https://blockchain.info/en/wallet/new
* Acquire Bitcoin Crypto Currency:
https://localbitcoins.com/buy_bitcoins (Visa / MasterCard, QIWI Visa Wallet, etc.)
* Send the required amount of BTC to the address specified in the letter

When the money transfer is confirmed, you will receive a file decryptor for your computer.
After starting the decryption program, all your files will be restored.

Guarantee of decryption of files.
Before payment, you can send us up to 3 files for free decryption.
They should not contain important information, the total size of the files should not be more than 10 mb.

Attention!
* Do not attempt to uninstall the program or run antivirus software
* Attempts to self-decrypt files will result in the loss of your data
* Decoders of other users are incompatible with your data, as each user
unique encryption key

The note of the Scarab ransomware states that your files are encrypted and that you have to pay a ransom to get them back to normal. However, you should NOT under any circumstances pay any ransom sum. Your files may not get recovered, and nobody could give you a guarantee for that. Adding to that, giving money to cybercriminals will most likely motivate them to create more ransomware viruses or commit different criminal activities. That may even result to you getting your files encrypted once again.

The following two email addresses are being used for contacting the cybercriminals:

Another thing to take note of is that the virus might be decryptable as some researchers believe it is a version of the Scarab-Bomber Ransomware virus.

.ukrain Files Virus (Scarab) – Encryption Process

What is known for the encryption process of the Scarab ransomware is that every file that gets encrypted will receive the .ukrain suffix. That suffix is appended to the name of an encrypted file as a secondary extension. The original extension and filenames remain unchanged after encryption, as the .ukrain extension is added.

Currently there is no information regarding which types of files get encrypted by the malicious application.

The files which are used the most by users that probably get encrypted are probably from the following categories:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

This ransomware might be decryptable, but no specific decryption tool is released yet.

The Scarab cryptovirus deletes all Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

Along with the above-stated command, other ones are executed, which remove backups, making the effects of the encryption process more efficient. Those commands remove some of the viable ways to restore your data via Windows inherent processes. If a computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore some files back to their original state.

Remove Scarab Ransomware Virus and Restore .ukrain Files

If your computer system got infected with the Scarab ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by Scarab (.ukrain) and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Scarab (.ukrain).
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Scarab (.ukrain) follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Scarab (.ukrain) files and objects
2. Find files created by Scarab (.ukrain) on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by Scarab (.ukrain)
Tsetso Mihailov

Tsetso Mihailov

Tsetso Mihailov is a tech-geek and loves everything that is tech-related, while observing the latest news surrounding technologies. He has worked in IT before, as a system administrator and a computer repair technician. Dealing with malware since his teens, he is determined to spread word about the latest threats revolving around computer security.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...