Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
If the ransomware uses encryption to take files or an entire system hostage, the encryption may be sufficient to make it very difficult to decrypt the files without the necessary decryption key.
In such circumstances, the recommended course of action is to report the crime to the relevant authorities and restore the affected data from a backup.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
The BandarChor ransomware is reportedly distributed via email and exploit kits. On execution, the malware drops a copy of itself and the ransom notification image (below) into the Startup directory.
Screenshot of BandarChor ransom message
It then attempts to encrypt various file types (DOC, XLS, JPG and so on) and rename them using the formula [filename].id-[ID]firstname.lastname@example.org. The affected machine's computer name and ID are then reported to a remote location.
For more information, please see: