What is ScareCrow Ransomware
ScareCrow is a ransomware infection that first appeared on malware radars in 2019. Since then, the ransomware has undergone a couple of insignificant changes and upgrades. For instance, depending on which ScareCrow versions attacked the system, either .scrcrw or .CROW extensions will be assigned to targeted files. Ransomware infections are designed to encrypt potentially valuable data and hold it blocked until victims meet cybercriminals’ demands to pay a ransom. ScareCrow uses a combination of AES and RSA cryptographic algorithms to thoroughly encryption of data. After successfully making files inaccessible, the virus automatically opens a pop-up window with decryption instructions. Please note that paying the ransom might not be mandatory – victims are advised to contact reputable ransomware researcher Michael Gillespie and decrypt ScareCrow files for free.
Hey! We encrypted your files!
---------------------------
What happened to my files?
---------------------------
We encrypted your files with a military grade algorithm, you can decrypt them only with a unique password!
---------------------------
How can i recover my files?
---------------------------
You can recover your files paying $10 in ETH at the following ETH address: 0x357fd0e7ac5421218c4ede5b3239d4e38d6ed019
Then you need to send an email to *** with a payment proof and your serial number, in 24/48 hours we will give you your password.
---------------------------
Why should i trust you?
---------------------------
For us you are only a victim in thousands, why should we scam you?
Our only goal is to have $10 and then we will decrypt all your files.
---------------------------
What is ETH?
---------------------------
The Ethereum platform is in effect a "super" distributed computer, for distributed computers we mean a global and decentralized network of computers that interact with each other sharing computational power (computing power) in order to verify transactions.
This high computational power has given the possibility to build an open-source, public and P2P (peer-to-peer) platform which, through the use of EVM (Ethereum Virtual Machine), provides users with the possibility of writing, with the Turing-complete language, smart contracts.
We know, it's a little difficult to understand, but it's simple, it's a cryptocurrency.
---------------------------
Where can i buy it?
---------------------------
You can buy Ethereum from a lot of websites, here is some:
-Coinbase (only USA. Europe and Canada) HIGHLY RECCOMENDED WEBSITE
-Coinmama
-Bit Panda (only Europe)
-CEX.io (really slow confirmation time)
---------------------------
I have the password, how can i recover my files?
---------------------------
To recover your files you need to insert the file directory (ie: C:\Users\Lory\Desktop\myfile.txt.scrcrw) and press Decrypt,
then you can rename the file and delete the .scrcrw extension.
Threat actors demand victims to transfer 10$ (in Ethereum cryptocurrency) to the specified crypto wallet address. After this, victims have to demonstrate the confirmation of payment by sending a message to the extortionists’ e-mail. Then, victims will supposedly receive a password for decryption. As a rule, the majority of ransomware infections are impossible to decrypt without the help of original virus developers, however, as we mentioned before, the ransomware researcher Michael Gillespie (@demonslay335 on Twitter) is capable of decrypting many ScareCrow instances and can be contacted for free help. Other recovery paths are to either collaborate with cybercriminals or restore encrypted data from backups. Backups are copies of files stored on external storage (e.g., cloud, USB pendrives, etc.) that were not affected at the time of infection. Usually, it is recommended against paying the ransom as many threat actors end up being scammers and do not send any decryption tools/passwords eventually. However, considering the demanded ransom is only 10$ (compared to hundreds or thousands extorted by other ransomware attackers), this may also be an option if you are not afraid to risk this amount of money. In any case, which does not include the participation of the attackers, it is pertinent to remove ScareCrow Ransomware from your computer – to prevent it from being a threat to the safety of other files. Follow our guide below to do it. Additionally, you will also familiarize yourself with reputable decryption/recovery software, which has shown good effectiveness in decrypting data of other file encryptors.
How ScareCrow Ransomware infected your computer
Malware distribution campaigns are often set up through trojans, malicious e-mail spam letters, fake updates, and license cracking tools, infected installers of pirated or cracked software, unprotected RDP configuration, unreliable ads, backdoors, keyloggers, and other such vectors. As a rule, threat actors make their best to force inexperienced users into opening some malicious file or link. For instance, ransomware can be disguised as a legitimate-looking file (.DOCX, .XLSX, .PDF, .EXE, .ZIP, .RAR, or .JS extensions) in an e-mail letter. Such e-mails tend to impersonate legal companies/entities (e.g., delivery companies, tax authorities, banks, and so forth) and are named in click-bait ways to reflect some “importance”, or “urgency”. Usually, the attached content in such malicious letters triggers the installation of malware. A similar infection pattern can be seen in other distribution channels as well, for instance, when users download some pirated or cracked version of the software from a shady web page. The installation of such software may look completely unsuspicious, but eventually, lead to sad implications in form of a malware infection. Thus, beware of interacting with dubious download sources, torrent-sharing pages, suspicious ads, potentially malicious attachments/links, and other kinds of risky content. Download software only from official resources to prevent drive-by (stealth) installations of malware. Read our guide below to remove ransomware infections, recover files, and establish protection against such threats in the future.
- Download ScareCrow Ransomware Removal Tool
- Get decryption tool for .scrcrw or .CROW files
- Recover encrypted files with Stellar Data Recovery Professional
- Restore encrypted files with Windows Previous Versions
- Restore files with Shadow Explorer
- How to protect from threats like ScareCrow Ransomware
Download Removal Tool
To remove ScareCrow Ransomware completely, we recommend you to use WiperSoft Antispyware. It detects and removes all files, folders, and registry keys of ScareCrow Ransomware. WiperSoft Antispyware offers free scan and 7-days limited trial.
Alternative Removal Tool
To remove ScareCrow Ransomware completely, we recommend you to use Norton Antivirus from Symantec. It detects and removes all files, folders, and registry keys of ScareCrow Ransomware and prevents future infections by similar viruses.
ScareCrow Ransomware files:
README.txt
{randomname}.exe
ScareCrow Ransomware registry keys:
no information
How to decrypt and restore .scrcrw or .CROW files
Use automated decryptors
Download Kaspersky RakhniDecryptor
Use following tool from Kaspersky called Rakhni Decryptor, that can decrypt .scrcrw or .CROW files. Download it here:
There is no purpose to pay the ransom because there is no guarantee you will receive the key, but you will put your bank credentials at risk.
Dr.Web Rescue Pack
Famous antivirus vendor Dr. Web provides free decryption service for the owners of its products: Dr.Web Security Space or Dr.Web Enterprise Security Suite. Other users can ask for help in the decryption of .scrcrw or .CROW files by uploading samples to Dr. Web Ransomware Decryption Service. Analyzing files will be performed free of charge and if files are decryptable, all you need to do is purchase a 2-year license of Dr.Web Security Space worth $120 or less. Otherwise, you don’t have to pay.
If you are infected with ScareCrow Ransomware and removed from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:
Use Stellar Data Recovery Professional to restore .scrcrw or .CROW files
- Download Stellar Data Recovery Professional.
- Click Recover Data button.
- Select type of files you want to restore and click Next button.
- Choose location where you would like to restore files from and click Scan button.
- Preview found files, choose ones you will restore and click Recover.
Using Windows Previous Versions option:
- Right-click on infected file and choose Properties.
- Select Previous Versions tab.
- Choose particular version of the file and click Copy.
- To restore the selected file and replace the existing one, click on the Restore button.
- In case there is no items in the list choose alternative method.
Using Shadow Explorer:
- Download Shadow Explorer program.
- Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
- Select the drive and date that you want to restore from.
- Right-click on a folder name and select Export.
- In case there are no other dates in the list, choose alternative method.
If you are using Dropbox:
- Login to the DropBox website and go to the folder that contains encrypted files.
- Right-click on the encrypted file and select Previous Versions.
- Select the version of the file you wish to restore and click on the Restore button.
How to protect computer from viruses, like ScareCrow Ransomware , in future
1. Get special anti-ransomware software
Use ZoneAlarm Anti-Ransomware
Famous antivirus brand ZoneAlarm by Check Point released a comprehensive tool, that will help you with active anti-ransomware protection, as an additional shield to your current protection. The tool provides Zero-Day protection against ransomware and allows you to recover files. ZoneAlarm Anti-Ransomware is compatible with all other antiviruses, firewalls, and security software except ZoneAlarm Extreme (already shipped with ZoneAlarm Anti-Ransomware) or Check Point Endpoint products. The killer features of this application are: automatic file recovery, overwrite protection that instantly and automatically recovers any encrypted files, file protection that detects and blocks even unknown encryptors.
2. Back up your files
As an additional way to save your files, we recommend online backup. Local storage, such as hard drives, SSDs, flash drives, or remote network storage can be instantly infected by the virus once plugged in or connected to. ScareCrow Ransomware uses some techniques to exploit this. One of the best services and programs for easy automatic online backup is iDrive. It has the most profitable terms and a simple interface. You can read more about iDrive cloud backup and storage here.
3. Do not open spam e-mails and protect your mailbox
Malicious attachments to spam or phishing e-mails are the most popular method of ransomware distribution. Using spam filters and creating anti-spam rules is good practice. One of the world leaders in anti-spam protection is MailWasher Pro. It works with various desktop applications and provides a very high level of anti-spam protection.