- Home
- Detectable Ransomware
- BandarChor
Ransomware Research
BandarChor Ransomware
BandarChor is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on March 1, 2016, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Rakhni 2015.
Quick Facts
- Ransomware Family
- BandarChor
- First Seen
- March 1, 2016
- Known Aliases
- Rakhni 2015
How BandarChor Ransomware Works
Targeted Files
Full extension -> .id-[ID]_[email_address] Autoruns.zip.id-6200928511_bingo@opensourcemail.org https://www.bleepingcomputer.com/news/security/new-bandarchor-ransomware-variant-spreads-via-malvertising-on-adult-sites/ Requires C&C (can be launched with FakeNetNG) https://github.com/aboveaboutbelow/BandarChorFileRestorer/blob/master/FileRestorer.py
File Encryption Patterns
BandarChor modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
._europay@india.com
._info@cryptedfiles
._kiaracript@gmail
.-kiaracript@gmail.com
._bingo@opensourcemail.org
Ransom Note and Payment Demands
After encrypting files, BandarChor displays ransom notes demanding payment for file recovery:
HOW TO DECRYPT.txt
Ransom message:
notes/HOW TO DECRYPT.txt
Technical Indicators
Associated Executable Files
The following executable files are associated with BandarChor ransomware:
5484f8ezf.exe
Bandarchor
3CE1.tmp
123.exe
VTDL02DD13752ABC64E586DF130B913CDE22.exe
Elastio Can Help You
Don't let BandarChor ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This BandarChor ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like BandarChor.
Last updated: July 30, 2025