SamSam Ransomware - How To Remove?
SamSam ransomware (also Samas/Samsa/MSIL.B/C), like many of ransomware viruses, uses asymmetric encryption algorithm. But the peculiarity of this particular file encrypter is that it generates the RSA key pair itself. Thus, it does not need to connect to a C&C (Command and Control) server to send the public key on the victim’s computer. Samsam encoder is aimed at vulnerable server-side software. Thus, computer networks are more likely to be targeted. To be more specific, this means that this server-side ransomware organizes attacks on companies and organizations.
About SamSam Ransomware
SamSam ransomware has been reported to attack mainly hospitals, for example Maryland hospital group, the Hollywood Presbyterian medical facility, etc. It is written in C-based language (C#). The executables are named as sikanomit.exe, RikiRafael.exe, psexec.exe. etc. After the encryption, the ransomware appends the following extensions to the encrypted files: .encedRSA, .encryptedRSA, .encryptedAES, .canihelpyou, .only-we_can-help_you, .justbtcwillhelpyou, .btcbtcbtc, .btc-help-you. It is a feature which segregates SamSam virus from other ransomware viruses since many of its affiliates are characterized by the one filename extension, which is also their trademark. HELP_DECRYPT_YOUR_FILES.html, HOW_TO_DECRYPT_FILES.html or HELP_FOR_DECRYPT_FILE.html files are placed in all folders of encrypted files and on the victim’s desktop. The files contain the ransom note:
#What happened to your files?
All your files encrypted with RSA-2048 encryption, For more information search in Google “RSA Encryption”
#How to recover files?
RSA is a asymmetric cryptographic algorithm, You need one key for encryption and one key for decryption
So you need Private key to recover your files.
It’s not possible to recover your files without private key
#How to get private key?
You can get your private key in 3 easy step:
Step1: You must send us 1.7 Bitcoin for each affected PC OR 22 Bitcoin to receive ALL Private Keys for ALL affected PC’s.
Step2: After you send us 1.7 Bitcoin, Leave a comment on our Site with this detail: Just write Your “Host name” in your comment
*Your Host name is: SERVERNAME
Step3: We will reply to your comment with a decryption software, You should run it on your affected PC and all encrypted files will be recovered
*Our Site Address: http://roe53ncs47yt564u.onion/east3/
*Our BitCoin Address:136hcUpNwhpKQQL7iXXWmwUnikX7n98xsL
(If you send us 22 Bitcoin For all PC, Leave a comment on our Site with this detail: Just write “For All Affected PCs” in your comment)
How To Access To Our Site
For access to our site you must install Tor browser and enter our site URL in your tor browser.
You can download tor browser from https://www.torproject.org/download/download.html.en
For more information please search in Google “How to access onion sites”
# Test Decryption #
Check our site, We generated a decryption software for one of your computer randomly, Don’t worry it’s not malicious software.
If you afraid to run “Test Decryption” software, You can run it on a VM(Virtual machine), also you need some encrypted file in VM from test computer
#Where to buy Bitcoin
We advice you to buy Bitcoin with Cash Deposit or WesternUnion From https://www.bitquick.co/buy-2.php or https://coincafe.com/buybitcoinswestern.php
Because they don’t need any verification and send your Bitcoin quickly.
You just have 7 days to send us the Bitcoin after 7 days we will remove your private key and it’s impossible to recover your files
So, as you can see from the message, 1.7 BTC (Bitcoins) per computer to 22 BTC for the whole network is demanded by these cyber crooks. Thus, the size of the ransom is ranges from 1,146.07 USD to 14,828.84 USD at this particular moment of writing the article (BTC value constantly fluctuates). As you can see, the amount is quite large. Well, this is fairly self-explanatory since SamSam cryptomalware mainly targets companies and organizations, the individual users leaving aside (well, at least so far).
How is SamSam Ransomware Distributed?
Unlike all the flock of ransomware viruses, Samsam ransomware does not employ spam e-mails to infect the victim’s computer. This cryptomalware is designed for server-level method of distribution. It employs JexBoss tool to exploit the vulnerabilities of Red Hat’s JBoss enterprise software. Thus, enterprises using the latter software are in danger of experiencing SamSam virus attack. As a consequence, it is paramount to patch server vulnerabilities with professional security tools (read the following paragraph to know the exact tools).
How to Decrypt Files Encrypted by SamSam Ransomware?
The good news is that this ransomware is only compatible with versions of Windows starting from Vista. It will not have an encryption implemented on computers running the earlier versions of Windows. On the other hand, the bad news is that there are no decryptor developed yet. For the time being, create a copy of your infected drive. This way, in the future you will be able to make use of a decryptor to be created. Make sure to back up your data externally as well. To retrieve your data apply data recovery tools by Kaspersky Lab, R-Studio, PhotoRec, Recuva, etc. SamSam malware deletes Shadow Volume Copies, so Shadow Volume Service is not applicable. But, at first, remove the ransomware with reputable automatic malware removal tools – Reimage, SpyHunter or Hitman. Manual instructions, developed by our security experts, are completely free and provided just below.
Update of December, 2016. The current version of Samas ransomware adds .VforVendetta extension to the locked files and drops ooo-PLEASE-READ-WE-HELP.html note of the ransom.
Update of the 20th of December, 2016. The recent Samas crypto-malware’s version is recognisable by the .theworldisyours extension and the CHECK-IT-HELP-FILES.html ransom note.
Update of the 30th of December, 2016. The latest variant Of Samas crypto-locker adds .Whereisyourfiles extension and leaves WHERE-YOUR-FILES.html ransom note.
Update of the 9th of January, 2017. An addition to the Samas crypto-ransomware has been detected in the wild. It appends .helpmeencedfiles to the encrypted data and leaves a HELP-ME-ENCED-FILES.html file with instructions.
Update of the 23rd of January, 2017. Security researchers became aware of a new version of SamSam ransomware. It differs from the original version by appending a different extension to the encrypted files: .powerfulldecrypt and leaving a ransom note, called WE-MUST-DEC-FILES.html. in addition to this variant, a sample with .noproblemwedecfiles extension was spotted. It leaves a link to a website in a HTML file, called 000-No-PROBLEM-WE-DEC-FILES.html.
Update of the 30th of January, 2017. Even though only a week has passed from our last update for this virus, we once again have some new information about SamSam ransomware. It has been spotted to feature a new extension: .weareyourfriends. It leaves TRY-READ-ME-TO-DEC.html file as a ransom note. Furthermore, also another variant of Samas virus has been noticed to append .otherinformation and requires people to read 000-IF-YOU-WANT-DEC-FILES.html file.
Update of the 6th of February, 2017. SamSam ransomware virus has been extremely active this past month. Now, yet another sample has been released and it marks data with .letmetrydecfiles extension and leaves a LET-ME-TRY-DEC-FILES.html ransom note.
Update of the 20th of March, 2017. A new variant of SamSam ransomware has been discovered and it adds .iaufkakfhsaraf extension to the data it corrupts. IF_WANT_FILES_BACK_PLS_READ.html is the new file that introduces the ransom note.
Update of the 27th of March, 2017. As usual, we are regularly updating our article once a new sample of SamSam ransomware is detected. This time, the new variant features a .cifgksaffsfyghd and inserts an READ_READ_DEC_FILES.html file to lead victims to the ransom note.
Update of the 10th of April, 2017. A new variant of SamSam ransomware discovered. .skjdthghh extension is added to the encrypted data and the ransom note is called 009-READ-FOR-DECCCC-FILESSS.html.
Update of the 26th of June, 2017. After being silent for quite some time, SamSam crypto-virus returns. Its newly-detected samples feature these extension: .breeding123, .mention9823, .suppose666.
- About SamSam Ransomware
- How is SamSam Ransomware Distributed?
- How to Decrypt Files Encrypted by SamSam Ransomware?
- Automatic SamSam Ransomware removal tools
- How to recover SamSam Ransomware encrypted files and remove the virus
- Step 1. Restore system into last known good state using system restore
- Step 2. Complete removal of SamSam Ransomware
- Step 3. Restore SamSam Ransomware affected files using Shadow Volume Copies
- Step 4. Use Data Recovery programs to recover SamSam Ransomware encrypted files
- Removal guides in other languages
Automatic SamSam Ransomware removal tools
How to recover SamSam Ransomware encrypted files and remove the virus
Step 1. Restore system into last known good state using system restore
1. Reboot your computer to Safe Mode with Command Prompt:
for Windows 7 / Vista/ XP
- Start → Shutdown → Restart → OK.
- Press F8 key repeatedly until Advanced Boot Options window appears.
- Choose Safe Mode with Command Prompt.
for Windows 8 / 10
- Press Power at Windows login screen. Then press and hold Shift key and click Restart.
- Choose Troubleshoot → Advanced Options → Startup Settings and click Restart.
- When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings.
2.Restore System files and settings.
- When Command Prompt mode loads, enter cd restore and press Enter.
- Then enter rstrui.exe and press Enter again.
- Click “Next” in the windows that appeared.
- Select one of the Restore Points that are available before SamSam Ransomware has infiltrated to your system and then click “Next”.
- To start System restore click “Yes”.
Step 2. Complete removal of SamSam Ransomware
After restoring your system, it is recommended to scan your computer with an anti-malware program, like Reimage and remove all malicious files related to SamSam Ransomware. You can check other tools here.
Step 3. Restore SamSam Ransomware affected files using Shadow Volume Copies
If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually SamSam Ransomware tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so.
Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer.a) Native Windows Previous Versions
Right-click on an encrypted file and select Properties → Previous versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
b) Shadow Explorer
It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Step 4. Use Data Recovery programs to recover SamSam Ransomware encrypted files
There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
- We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
- Download Data Recovery Pro (commercial)
- Install and scan for recently deleted files.
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.