Threat Database Ransomware Scarab-Enter Ransomware

Scarab-Enter Ransomware

By GoldSparrow in Ransomware

The Scarab-Enter Ransomware is an encryption ransomware Trojan used to make the victims' files inaccessible so that they may be willing to pay a ransom payment to get back the compromised data. The Scarab-Enter Ransomware belongs to a large family of ransomware, the Scarab family, which has seen numerous variants released in 2018. The Scarab-Enter Ransomware is easy to identify because the files encrypted by the Scarab-Enter Ransomware attack are marked with the file extension '.Enter,' added to the file's name.

How the Scarab-Enter Ransomware Attack Works

The Scarab-Enter Ransomware attack is identical to most encryption ransomware Trojans, using the AES and RSA encryptions to make the victim's files inaccessible. The Scarab-Enter Ransomware will first verify that it is not running on a virtual environment and no software that could interfere with its attack is present. Once this has been confirmed, the Scarab-Enter Ransomware will launch its attack, which encrypts the victim's files. The Scarab-Enter Ransomware's attack targets numerous user-generated files, including the ones with the following file extensions:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The Scarab-Enter Ransomware delivers a ransom note in the form of a text file that is named 'HELP HELP HELP.TXT' after the victim's files have been encrypted. This ransom note demands payment from the victim, asking the victim to contact the criminals via BitMessage or through another anonymous method. The following is the text of the Scarab-Enter Ransomware ransom note:

'All your files are encrypted!
Your ID
6902000000000000B2939A051D92890DC030080357E235B0FF62BD54AAAAB47CF691CC9DCA1B4B79DDDECDD46C9D3C5BB2AD
[redacted]
0FA3DB6CBDBDACFBCC5A4F1573E336877145FEABD375D75CF83BF75D9E1FE775D59397AAB3E6E498B0B10D8F542386E66A92
[redacted]
1390307560CCE4CB19DEA582F6AC0E799938F11A604A7BCB9B241F1429E467B14F229B28C16FCC1851B0A76530330DD98822
[redacted]
92C4183C0E6655881241EA6FA8C793E3CE95E25615DB98F800
Get a decoder:
enter_software@aol.com
enter_software@india.com
If you can not contact by mail
* Register on the site http://bitmsg.me (Bitmessage online sending service)
* Write a letter BM-2cTXnB6dEE6TdHmAJCnEHp9PdsPThtS5n4 with your mail and ID.
If the site does not work, use vpn or torproject.org.'

Protecting Your Data from Threats Like the Scarab-Enter Ransomware

The best way to protect your data from threats like the Scarab-Enter Ransomware is to have a malware removal tool that is fully up-to-date and a way to recover any data encrypted by the Scarab-Enter Ransomware. Unfortunately, the files encrypted by the Scarab-Enter Ransomware cannot be restored so that it is important to have file backups. Having backup copies of your data and storing these backups in a secure location can ensure that you can recover any data compromised by the Scarab-Enter Ransomware Trojan and avoid having to negotiate with these criminals. Apart from file backups and a reliable security program, recognizing the most common methods in which threats like the Scarab-Enter Ransomware are delivered and being able to recognize and respond to these safely is an essential part of preventing all malware attacks, including the Scarab-Enter Ransomware Trojan.

Trending

Most Viewed

Loading...