Trojan:W32/BandarChor Ransomware Removal - How to, Technology and PC Security Forum |

Trojan:W32/BandarChor Ransomware Removal

TypeRansomware, Trojan
Short DescriptionThe ransomware is distributed via corrupted emails and exploit kits.
SymptomsFiles on the system’s are encrypted and a payment is demanded for their decryption.
Distribution MethodCorrupted emails, Exploit Kits.
User ExperienceJoin our forum to follow the discussion about Trojan:W32/BandarChor.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Ransomware attacks have reached a new peak. A new ransomware threat has been reported to attack users via email and exploit kits. It is dubbed BandarChor. When executed, BandarChor drops a copy of itself into the Startup directory, as well as the ransom message.


Image Source: F-Secure

BandarChor Short Descripton

According to researchers at F-Secure, once in the system, the ransomware will attempt to encrypt different types of files such as .doc, .xls, .jpg, etc., and will rename them via the following formula:

→[filename].id-[ID][email protected]

Once this is done, the victim’s PC name and ID will be reported to a remote location.

BandarChor Technical Details

Trojan:W32/BandarChor is a ransomware Trojan that is designed to take control of the victim’s computer and data. Once the user’s files are encrypted, the ransomware will typically ask for payment to restore them.

BandarChor attacks have been reported to start earlier this year, in March, and have been recently revived.
F-Secure researchers have compiled a list with the domains that have been connected to the ransomware attack:


Here is a list of the files targeted by the ransomware piece:

.113, .1cd, .3gp, .73b, .a3d, .abf, .abk, .accdb, .arj, .as4, .asm, .asvx, .ate, .avi, .bac, .bak, .bck, .bkf, .cdr, .cer, .cpt, .csv, .db3, .dbf, .doc, .docx, .dwg, .erf, .fbf, .fbk, .fbw, .fbx, .fdb, .gbk, .gho, .gzip, .iv2i, .jpeg, .jpg, .key, .keystore, .ldf, .m2v, .m3d, .max, .mdb, .mkv, .mov, .mpeg, .nbd, .nrw, .nx1, .odb, .odc, .odp, .ods, .odt, .old, .orf, .p12, .pdf, .pef, .ppsx, .ppt, .pptm, .pptx, .pst, .ptx, .pwm, .pz3, .qic, .r3d, .rar, .raw, .rtf, .rwl, .rx2, .sbs, .sldasm, .sldprt, .sn1, .sna, .spf, .sr2, .srf, .srw, .tbl, .tib, .tis, .txt, .wab, .wps, .x3f, .xls, .xlsb, .xlsk, .xlsm, .xlsx, .zip

How Are Users Affected by BandarChor Ransomware?

According to a user of BleepingComputer , the BandarChor is primarily distributed via corrupted emails. Another possible way employed by Trojan:W32/BandarChor is via exploit kit attacks. When browsing unsafely, the user may encounter an infected website and experience a drive-by download.

How Can I Remove BandarChor and Restore Encrypted Files?

A strong anti-malware tool will detect and remove the threat, but it will not decrypt the files. However, a BandarChorFileRestorer has been created. Users can try and regain access to their files via the tool.

Additionally, you can follow our instructions to restore files encrypted by ransomware manually. They are located below the article.

To stay safe against file-encrypting threats, always remember to back up your files.

1. Start Your PC in Safe Mode to Remove Trojan:W32/BandarChor.

For Windows XP, Vista, 7 systems:

1. Remove all CDs and DVDs, and then Restart your PC from the “Start” menu.
2. Select one of the two options provided below:

For PCs with a single operating system: Press “F8” repeatedly after the first boot screen shows up during the restart of your computer. In case the Windows logo appears on the screen, you have to repeat the same task again.


For PCs with multiple operating systems: Тhe arrow keys will help you select the operating system you prefer to start in Safe Mode. Press “F8” just as described for a single operating system.


3. As the “Advanced Boot Options” screen appears, select the Safe Mode option you want using the arrow keys. As you make your selection, press “Enter“.

4. Log on to your computer using your administrator account


While your computer is in Safe Mode, the words “Safe Mode” will appear in all four corners of your screen.

For Windows 8, 8.1 and 10 systems:
Step 1: Open the Start Menu
Windows-10-0 (1)
Step 2: Whilst holding down Shift button, click on Power and then click on Restart.
Step 3: After reboot, the aftermentioned menu will appear. From there you should choose Troubleshoot.
Step 4: You will see the Troubleshoot menu. From this menu you can choose Advanced Options.
Windows-10-2 (1)
Step 5: After the Advanced Options menu appears, click on Startup Settings.
Windows-10-3 (1)
Step 6: Click on Restart.
Windows-10-5 (1)
Step 7: A menu will appear upon reboot. You should choose Safe Mode by pressing its corresponding number and the machine will restart.

2. Remove Trojan:W32/BandarChor automatically by downloading an advanced anti-malware program.

To clean your computer you should download an updated anti-malware program on a safe PC and then install it on the affected computer in offline mode. After that you should boot into safe mode and scan your computer to remove all Trojan:W32/BandarChor associated objects.

Security engineers recommend that you back up your files immediately, preferably on an external memory carrier in order to be able to restore them. In order to protect yourself from Trojan:W32/BandarChor (For Windows Users) please follow these simple instructions:
For Windows 7 and earlier:
1-Click on Windows Start Menu
2-Type Backup And Restore
3-Open it and click on Set Up Backup
4-A window will appear asking you where to set up backup. You should have a flash drive or an external hard drive. Mark it by clicking on it with your mouse then click on Next.
5-On the next window, the system will ask you what do you want to backup. Choose the ‘Let Me Choose’ option and then click on Next.
6-Click on ‘Save settings and run backup’ on the next window in order to protect your files from possible attacks by Trojan:W32/BandarChor.
For Windows 8, 8.1 and 10:
1-Press Windows button + R
2-In the window type ‘filehistory’ and press Enter
3-A File History window will appear. Click on ‘Configure file history settings’
4-The configuration menu for File History will appear. Click on ‘Turn On’. After its on, click on Select Drive in order to select the backup drive. It is recommended to choose an external HDD, SSD or a USB stick whose memory capacity is corresponding to the size of the files you want to backup.
5-Select the drive then click on ‘Ok’ in order to set up file backup and protect yourself from Trojan:W32/BandarChor.
Enabling Windows Defense Feature:
1- Press Windows button + R keys.
2- A run windows should appear. In it type ‘sysdm.cpl’ and then click on Run.
3- A System Properties windows should appear. In it choose System Protection.
5- Click on Turn on system protection and select the size on the hard disk you want to utilize for system protection.
6- Click on Ok and you should see an indication in Protection settings that the protection from Trojan:W32/BandarChor is on.
Restoring a file via Windows Defense feature:
1-Right-click on the encrypted file, then choose Properties.
2-Click on the Previous Versions tab and then mark the last version of the file.
3-Click on Apply and Ok and the file encrypted by Trojan:W32/BandarChor should be restored.

Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share