RedAnts ransomware : Threat Analysis
RedAnts ransomware is a newly detected file-encrypting virus that has been reported by the security analysts which cause data encryption through AES encryption algorithm. The malware enciphered the files stored on compromised machines after which it adds “.Horas-Bah” file extension to them. Also, it placed a file named as “READ_ME.txt” known as a ransom note. This ransom notification aims to display ransom demands to pay the hefty sum of money i.e. 0.5 BTC (approximately equal to $630) to the criminal hacker behind this nasty ransomware threat in order to get the files back. However, paying ransom money is strongly inadvisable. Instead, security researchers recommend reading this article carefully. This article is especially created to help you remove RedAnts ransomware and recover files encoded by this malware with the appended “.Horas-Bah” file extension onto them.
How Does RedAnts ransomware Infect Your Computer?
For this dangerous ransomware virus to cause an infection to the targeted computer, the hackers uses spam email campaign and spread its malicious payload attached with those emails. These spam campaigns are completely variable and may contain various convincing messages which aim to get the targeted system user to open the harmful mail attachment. Other distribution methods of RedAnts ransomware infection include the usage of bogus web installers of different applications as well as other bogus patches of the softwares or game cracks that are uploaded on torrent hosting web portals.
Technical Information on RedAnts ransomware
As soon as the computer user opens the harmful email attachment, the malware drops two malicious files onto the compromised machine, identified as RedAnts.exe and READ_ME.txt. The malicious file associated with RedAnts ransomware may be dropped in several vital Windows folders, such as %AppData%, %Local%, %LocalRow%, %Roaming% and %Windows%. Besides, the harmful executable of this ransomware is set to encode the files stored on %Desktop%, %Pictures%, %Downloads% and %Documents% folders.
After this attack has happened, the malware performs multiple other nasty activities onto the compromised PC. It begins the noxious activity with modifying the file extension of encoded files. After the successful encryption process, it adds “.Horas-Bah” file extension to every enciphered files. Besides, RedAnts ransomware leaves back information related to this attack in a “READ_ME.txt” file where users are asked to contact the hackers in their email address “firstname.lastname@example.org”. However, you should never try to pay ransom money and remove the malware as quickly as possible. Use backup copies for file restoration or use data recovery tool.
Manual RedAnts ransomware Removal From Compromised PC
Method 1: Boot Your Infected PC in Safe Mode
Press “Start”, type “msconfig” and hit “Enter” key.
Select “Boot” tab and check “Safe boot” option and then click on “OK” button.
Method 2: Remove RedAnts ransomware By Showing All Hidden Files and Folders
Click on “Start” button and go to “Control Panel”.
Select “Appearance and Personalization” option.
Tap on “Folder Options” and select “View” tab.
Choose “Show hidden files, folders and drivers” option. Then, click on “Apply” and “OK” button.
Now, find malicious files and folders created by RedAnts ransomware and delete them from the system immediately.
Method 3: Clean RedAnts ransomware Related Hosts File
Click on “Start” and type “%windir%/system32/Drivers/etc/hosts”.
Open “hosts” file with Notepad.
This file must contain the IP addresses of RedAnts ransomware that you can identify on the word “localhost”.
Method 4: Eliminate Harmful Entries of RedAnts ransomware From Registry Editor
Press “Win+R” keys simultaneously.
Type “regedit.exe” and hit “Enter” button.
Then after, clean startup folder: “HKLM\Software\Microsoft\Windows\Current version\Run”.
Method 5: Remove RedAnts ransomware Related Startup Items
Press “Start” and type “msconfig” then hit “Enter” button.
Choose “Startup” tab and uncheck all the suspicious items which is associated with RedAnts ransomware.
Important: Now, you can recover your system files after RedAnts ransomware removal. Information about the file restoration methods given below in this article.
Delete RedAnts ransomware By Using PC Threats Scanner
Manual removal of RedAnts ransomware requires interference with the computer files and registries. Hence, it can cause unexpected damages onto your machine. Even if your PC skills are not in a professional level, then don’t worry! You can do the ransomware removal yourself just in few minutes by using PC threats scanner.
How To Retrieve Encrypted Data & Files After Removing RedAnts ransomware
As it was stated in the ransom message, the users files and data cannot be decoded without a decryption key. The hackers insist on paying ransom money, focusing your attention and then trying to display the futility of attempts. In fact, without paying ransom fee to the RedAnts ransomware developers, users can recover their data in several ways. You need to delete the ransomware virus completely from your system and then go for the data recovery procedure. The first and most easy way to retrieve encrypted data is to use the backup. If you have a check-point, then setup at least 2 or 3 days before you get the RedAnts ransomware infection.
Step 1: Recover Files From Windows Backup
Click on “Start” and go to “Control Panel”.
Tap “System and Security” and select “Backup and Restore” option.
Choose “Restore files from backup” and specify the check-point to restore.
Step 2: Use Shadow Explorer To Retrieve Files Encrypted by RedAnts ransomware
If you don’t have the habit of creating backups, then you should use the Shadow Explorer utility. During the encryption process, the RedAnts ransomware creates an encrypted copies of the system files and delete the original data. In this kind of situation, you can use shadow copies to recover files and data.
Step 3: Restore Encrypted Data by RedAnts ransomware Using Data Recovery Software
In few cases, the nasty ransomware threats also delete the shadow volume copies of the data. Therefore, in such circumstances, you can download the data recovery software recommended below in this article that may help you to retrieve some of your data and files.