Malabu ransomware - How to remove

An offensive crypto-virus has emerged and it goes by the name of Malabu ransomware. AES algorithm for encryption help this virus gain some leverage, but Malabu did not take long to lose it. Considering, this is a poorly-written ransomware, based on the HiddenTear open source code. Additionally, the infection was revealed not to generate unique encryption/decryption keys. This means that a static key is utilized; this also translates into another positive news. Skilfully, security researchers updated their StupidDecryptor (the download process will begin immediately after you click on this shortcut) which is capable of reversing the effects that a number of ransomware infections have brought. From the tittle of the tool for decryption you should be able to tell that the addressed infections are shabby and would not be classified as sophisticated samples of malware.

Traits of Malabu ransomware

We have already briefly mentioned several features of Malabu cryto-virus, reminding users that ransomware, based on the open source project, is still being developed. These variants usually use AES encryption and so does Malabu sample. Infection also features a lock-screen which prevents victims from accessing their entire operating system. The image below displays the message which is seen once a device is locked. Malabu rasomware expresses demands for 500 US dollars to be send via bitcoin payment system. According to the latest rates, 0.41494 equals the required sum. If demands are not carried out in the next 48 hours after the lock-screen is displayed, the ransom doubles.

Malabu virus leaves an email address to receive letters from victims that have obediently followed the listed orders. [email protected] is the account, controlled by the creators of Malabu infection. Could it be that the hacker used his own name, Steve Rusell? The reasons for using a real name in the contact address remain unknown. In other news, Malabu crypto-virus proceeds similarly to Rijndael infection. How? They both append .fucked extension to the encrypted data and this is rather inappropriate. However, actions of ransomware creators are all shameless.

After looking at the sample of Malabu crypto-virus, we have determined that Malabu-X.exe is its payload. After it obtains a position in a device, the payload will begin its vicious activity, starting from making modifications to Windows Registry Keys. Ransomware has to complete this modification if the payload is to run automatically in the background, conclude encryption and present a screen-locker. Thankfully, this variant is not to be feared as a specific decryptor has already been indicated as capable of restoring files that Malabu ransomware encoded. Do NOT pay the ransom and click download to get the tool for decryption!

How to protect your files from Malabu ransomware and other variants of this malware group?

Malabu crypto-virus can be averted if you use appropriate security measures for your data. There are all sorts of online backup storages that will keep your files safe. Make sure you choose a reliable service to be guaranteed that your data is properly protected. Pay attention to reviews from security researchers and former/current users of a specific online backup storage. An alternative is to place your files into USB flash drives. The problem with this is that people tend to plug in these drives and leave them connected to their computers. Many ransomware variants are capable of encrypting data on all connected resources, including USB flash drives.

Ways to become infected with Malabu ransomware

If you catch Malabu crypto-virus, consider yourself lucky: not all infections are decryptable. There are a lot of sources to receive these viruses from and people are advised to pay special attention during their browsing. For example, email facilities can assist in hackers’ plans of distributing malware. Malicious documents and other files could be appended as attachments to email letters that are to be sent around to random people. If you happen to receive questionable email letters, allegedly addressing urgent matters, always be certain that they are sent from official email addresses. Additionally, ransomware could be spread via vulnerable websites, affected by exploit kits.

With the increasing amount of malware threats, users are recommended to secure their devices with reliable security software. Before proceeding to decrypt files with the tool that was mentioned before, there is still one task you must complete. Of course, we are referring to the fact that you have to remove the infection in advance. Spyhunter, Plumbytes and Malwarebytes will detect all threats and offer quick removal.

How to recover Malabu ransomware encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:


for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode
 

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again.CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before Malabu virus has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3
 

Step 2. Complete removal of Malabu ransomware

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Spyhunter and remove all malicious files related to Malabu virus. You can check other tools here.  

Step 3. Restore Malabu ransomware affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually Malabu virus tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so. Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer. a) Native Windows Previous Versions Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
Previous version
b) Shadow Explorer It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover Malabu ransomware encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download a data recovery program.
  • Install and scan for recently deleted files. Data Recovery Pro
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.
Leave a Reply

Your email address will not be published. Required fields are marked *