Kaandsona Ransomware Remove and Restore .kencf Files - How to, Technology and PC Security Forum | SensorsTechForum.com

Kaandsona Ransomware Remove and Restore .kencf Files

This article aims to help you fully delete Kaandsona Ransomware and try to restore the files encrypted by it.

A ransomware virus, known as Kaandsona or RansomTroll ransomware which enciphers the files on the compromised computers appending the .kencf file extension to them. And the ransomware also leaves a brief ransom note where it gives a deadline of 24 hours for the user to pay the ransom of 1 BTC to get the files back. Otherwise, the Kaandsona virus threatens to destroy all chances of paying. In case you have become a victim of the Kaandsona ransomware, recommendations are to eliminate it. Keep reading to learn more about this virus and learn how to remove it and try to get the files back.

Threat Summary



Short DescriptionThe Kaandsona ransomware encrypts files on computers infected by it and makes them no longer able to be opened. In addition to this it demands 1 BTC as a ransom payoff.
SymptomsFiles are encrypted with the .kencf file extension added to them. Ransom note and two executables dropped and many Windows files modified.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Kaandsona


Malware Removal Tool

User ExperienceJoin our forum to Discuss Kaandsona.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Kaandsona Ransomware – More Information

There are two malicious executable files, related to the Kaandsona virus. One of them has a completely random name and the other is called Kaandsona.exe. These files are believed to be dropped onto the victim’s computer via various distribution tactics.

Kaandsona’s Distribution

Regarding how the Kaandsona virus is spread, there may be more than one possibilities. The primary version is that the virus is replicated via distribution infectors, such as the following file types:

→ .htm, .html, .hta, .js, .vbs, .exe, .tmp, .dll

To infect, those type of files may be concealed with an obfuscator. This obfuscator aims to activate them without a conventional antivirus program raising any alarms. As soon as those files are activated, they may connect to the malicious C2 server of this virus, identified to be by malware researchers, believed to be US-based. Then those two executables belonging to Kaandsona RansomTroll may be downloaded onto one of the key Windows folders:

→ %AppData%

After the files are created, the virus modifies files in the %WINDIR% directory. The files are reported by hybrid-analysi.com to be the following:

→ “%WINDIR%\Microsoft.NET\Framework\v1.0.3705\clr.dll”

Kaandsona Ransomware – Post-Infection Analysis

After infecting the computer, the virus is rather simple in what it does to the files. It appends encryption by replacing bytes of information from those files, enough to render them no longer able to be opened. The encrypted files appear like the following:

The files it looks for to encode are from various types, such as:

  • Microsoft Office Documents.
  • PDF types of files.
  • Text files.
  • Database types of files.
  • Photos.
  • Music.
  • Videos.
  • Image Files.
  • Common files of storage.
  • Archives.

After encryption, the Kaandsona ransomware, leaves a ransom note here it leaves instructions on how to pay the ransom requested:

You have been struck by the holy Kaandsona ransomware
Either you pay 1 BTC in 24 hours or you lose ALL FILES
button ‘Show all encrypted files’
button ‘PAY’

Remove Kaandsona Ransomware and Restore Encrypted Files

To remove this virus completely from your computer, advices are to focus on following the removal instructions which we created below. They are designed so that you can manually look for the files of Kaandsona in a safe environment. However, since this ransomware also makes modifications to key Windows files, advices are to use a particular anti-malware product in order to remove the malware permanently from your computer.

After having removed Kaandsona, it is time to think about what to do with the files. One way to try and restore them is if you try out the methods we have posted about in step “2. Restore files encrypted by Kaandsona” below. They are in no way guaranteed, but they may revert at least some of the files. In the meantime, make sure to check this page regularly, if a decryptor for Kaandsona ransomware is developed by researchers, we will make sure and post it here.

Manually delete Kaandsona from your computer

Note! Substantial notification about the Kaandsona threat: Manual removal of Kaandsona requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Kaandsona files and objects
2.Find malicious files created by Kaandsona on your PC

Automatically remove Kaandsona by downloading an advanced anti-malware program

1. Remove Kaandsona with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by Kaandsona
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.