Solved

Savepanda@india.com Ransomware

Posted on 2016-08-29
9
124 Views
Last Modified: 2016-09-20
I have a server currently impacted with the Savepanda@india.com ransomware virus, but am having no luck at all removing the encryption.  I believe I have taken care of the effected PC, but still have a network location full of files that I'm in desperate need of unlocking.  I have followed countless tutorials including using Kaspersky Shade Decryptor to try to remove the encryption, but the app says the encryption doesn't match any of those in the database.  Any assistance would be gratefully appreciated, as we are currently dead in the water.  Long story short, recovery from a backup is not possible, nor is Volume Shadow Copy.
0
Comment
Question by:Kyle Witter
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 63

Accepted Solution

by:
btan earned 300 total points (awarded by participants)
ID: 41775752
better to use ID ransomware (https://id-ransomware.malwarehunterteam.com/) or Crypto Sheriff (https://www.nomoreransom.org/crypto-sheriff.php) to identify the ransomware so as to facilitate any available decryptor tool for it.

Likely it belong to the XTBL/CrySiS ransomware which is what I supposed you use the Shade decryptor and there is also no guarantee it works for variation of the ransom family. In fact there is another tool from McAfee too has a "Shade Ransomware Decryptor Tool". http://www.mcafee.com/us/downloads/free-tools/shadedecrypt.aspx

Good to confirm the type. I do suggest the clean build instead of scanning though you can go into the manual removal of the traces of the ransomware as shared in http://sensorstechforum.com/savepandaindia-com-virus-remove-restore-xtbl-files/ 

As a whole if there is no backup and the decryptor does not readily work, it is quite tough to get back those list of files..even forensic will be challenge as the malware will have securely wipe those files..
0
 
LVL 88

Expert Comment

by:rindi
ID: 41775934
Delete the files on the server, then restore them from your backups.
0
 
LVL 1

Author Comment

by:Kyle Witter
ID: 41776298
btan,

Thank you for the valueable information.  I'm working through the McAfee software now.. The ransom letter on this particular version does not show a key
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 
LVL 88

Expert Comment

by:rindi
ID: 41776318
Don't waste your time with non existing keys and decryption tools. Just do the restore from your backups and you'll be fine. That's one of the reasons you have backups for.
0
 
LVL 1

Author Comment

by:Kyle Witter
ID: 41776326
As previously mentioned, there are no backups of this device.
0
 
LVL 88

Assisted Solution

by:rindi
rindi earned 100 total points (awarded by participants)
ID: 41776364
Then consider the data lost and start fresh. After all, it can't have been important data if there was no backup.
0
 
LVL 63

Assisted Solution

by:btan
btan earned 300 total points (awarded by participants)
ID: 41776483
If you check the guide of the tool, it stated need to to get the private key file
1. Run the command with the User ID:
>shadedecrypt.exe -u F7AB2CA6D04AC4DA110C
You will receive a URL output to the console. Copy this URL into a browser and download the linked text
file. If you get a message such as "404 file not found" or " Cannot find file", then we have been
unable to locate the private key that encrypted the files.
So if that is missing the decryptor tool will not work for McAfee and also Kapersky. This variant may have already evolved to close up the gap and misses in the earlier version. Looks like there are no other means and you just have to move on then ...
http://www.mcafee.com/us/resources/misc/guides/shadedecrypt-readme.pdf
0
 
LVL 27

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 100 total points (awarded by participants)
ID: 41780947
Generally if there is nothing on nomoreransom.org, then you are out of luck. Backups (versioning only) will help you in the future,  but for now those files may be lost.  Make a backup,  in case a key/ decryptor is made available in the future., then rebuild.
0
 
LVL 63

Expert Comment

by:btan
ID: 41806190
As advised.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question