Infected with Shrug ransomware? Need to decrypt .SHRUG files?

What is Shrug ransomware

Shrug ransomware is another trojan, which encrypts all user data without any approval. Some users report, that their files renamed with adding .SHRUG extension. After encryption, files become unavailable for editing, view or playing, because the virus uses AES+RSA encryption. Cybercriminals demand ransom (in BTC) for a decryption program. Also, Shrug ransomware run the program, which locks screen on victim PC by message box with the text below:

Oh shit waddup ¯\_(ツ)_/¯
---
I know what you're thinking. "What happened?"
Well, the answer is quite simple. Before I tell you, promise me you will not get mad. Okay. Your PC was victim of a Ransomware attack.
That means every important file is now encrypted and you can't access them. Oh, and there is this screen locker too. You don't have access to your PC anymore.
What a shame, huh?
There is only one way to get your stuff back. $50. It isn't that much, cmon! I'll give you instructions on how to pay. Alright. To successfully pay the ransom and unlock all your sh*t, you will need Bitcoins. But wait, it is only 50 USD in Bitcoins, no worries. Nothing to worry about. You can buy it in the internet.
Oh, and don't even Google "how to remove a ransomware" because it will not help. When buying Bitcoins you will need a wallet. You can create one at a website called Blockchain. Now find a way to buy 50 USD in BTC. Google is your friend.
Then you must send the Bitcoins to the wallet specified in the right of the screen. After that, write your wallet inside that text box and finally click the button "I paid!". Wait some time until I confirm your payment and fix your files.
- Martha
---
Your files will be destroyed in
2 days, 23 hours, 59 minutes, 51 seconds
if you don't pay.
*****************************
(click to copy to clipboard)
[Your wallet goes here]
[I paid!]

We strongly recommend not to follow cyber scammers instructions, because they can trick you easily. At present moment we are working on removal and decryption methods. For removing Shrug ransomware and ..SHRUG files decryption, please try all methods from our article below (and check our updates).

Shrug ransomware.png

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. If you want to decrypt .SHRUG files, please follow our instruction below or, if you have any difficulties, please contact us: submit@securitystronghold.com. We really can help to decrypt your files.

How Shrug ransomware infected your PC

Shrug ransomware going through infected emails with documents, that contain malicious code. You shouldn’t open messages from unknown sources, and every attachment must be checked by antivirus software. Some sites can redirect users to malware sources, so users may be careful when they accept any actions, offered by unknown sources. Also, it’s useful to make backup copy of every important file.

First of all, don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the Shrug ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to Shrug ransomware – files, folders, registry keys.

 

Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

Restore .SHRUG files using shadow copies

stellar-data-recovery

  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.
Download Stellar Data Recovery

Step 2: Remove following files and folders of Shrug ransomware:

Related connections or other entries:

No information

Related files:

Shrug.exe

How to decrypt files infected by Shrug ransomware?

You can try to use manual methods to restore and decrypt your files.

Decrypt files manually

Restore the system using System Restore

system restore

Although latest versions of Shrug ransomware remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged. This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Protect your computer from ransomware

hitmanpro alert with cryptoguard

Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.

Download HitmanPro.Alert with CryptoGuard

Written by Tim Kas

Leave a Reply

Your email address will not be published. Required fields are marked *