Severity scale:  

Remove SamSam ransomware / virus (Removal Instructions) - updated Oct 2020

removal by Julie Splinters - - | Type: Ransomware

SamSam a dangerous ransomware virus that is using brute-force attacks for propagation

Questions about SamSam ransomware virus

SamSam virus imageSamSam virus is ransomware-type infection which particularly targets well-known organizations.
SamSam ransomware is a cryptovirus that was first spotted making rounds in March 2016. Despite being a relatively old infection, it is still prevalent in the US and some Asian countries. Fortunately, its developers, Faramarz Shahi Savandi and Mohammad Mehdi Shah, have already been found guilty.[1] Initially, malware used JBoss software vulnerability to install the payload remotely. In 2018, researchers observed hackers conducting brute-force attacks via FTP, RDP or Java-based servers. SamSam ransomware is huge, with total earnings of 6 million dollars during its time of operation over two and a half years.[2] It concurred such institutions like Labcorb or city of Atlanta, resulting in millions in damages. The malware is used exclusively for money extortion purposes – it uses RSA-2048 to lock up personal files and adds an appendix (such as .weapologize, .AreYouLoveMyRansFile, .breeding123, .country82000, etc.), making them inaccessible. To decipher them, victims have to pay a ransom in Bitcoin which can range up to $51,000.

Summary of the cyber threat
Name SamSam
Type Ransomware
Danger level High. Makes system changes and encrypts files
Release date June 2016
Cryptography RSA-2048
Appended extensions
  • .justbtcwillhelpyou
  • .btcbtcbtc
  • .btc -help-you
  • .only-we_can-help_you
  • .iwanthelpuuu
  • .notfoundrans
  • .checkdiskenced
  • .VforVendetta
  • .happenencedfiles
  • .Whereisyourfiles
  • .helpmeencedfiles
  • .wowwhereismyfiles
  • .wowreadfordecry
  • .powerfulldecrypt
  • .otherinformation
  • .letmetrydecfiles
  • .encryptedyourfiles
  • .weencedufiles
  • .hilegofprencrp
  • .iaufhhhfiles_BACK_PLS_READ.html
  • .iaufhhhhfiles_BACK_PLS_READ.html
  • .cifgksaffsfyghd
  • .checkdiskenced
  • .vekanhelpu
  • .moments2900
  • .country82000
  • .breeding123
  • .mention9823
  • .supported2017
  • .prosperous666
  • .myransext2017
  • .areyoulovemyrans
  • .weapologize
Ransom notes
  • 0009-SORRY-FOR-FILES.html,
  • 000-PLEASE-READ-WE-HELP.html,
  • 000-No-PROBLEM-WE-DEC-FILES.html,
  • 006-READ-FOR-HELLPP.html,
Ransom Varies. Some versions ask to pay 0.7 Bitcoins for one computer; others demand 45 BTC for the whole network.
To uninstall SamSam ransomware, install Reimage Reimage Cleaner Intego and run a full system scan

SamSam virus is identified by major security programs as Trojan.Ransom.SamSamMSIL/Filecoder_Samas.B!trBackdoor.Ratenjay.Gen!cMsil.Trojan.Dothetuk.Tccf, etc.[3] However, the virus is designed to bypass the computer's security, so it's not enough to install reputable security software to avoid the attack. Samsam.exe executable is dropped on the system when a victim opens a malicious email attachment.

Initially, SamSam ransomware is known to rely on fake email messages pretending to be notifications from UPS or similar delivery company. However, researchers noted malware shifted overtime and started using brute-force attacks to infect systems and its networks.

Once inside the system, ransomware encrypts files and provides a special email address (, etc.) to contact its developers. The data is typically encrypted with the RSA-2048 encryption algorithm, so there is no chance to guess the code needed for its decryption.

One of the examples of SamSam ransom notes:

#What happened to your files?
All your files encrypted with RSA-2048 encryption. For more information search in Google “RSA Encryption.”
#How to recover files?
RSA is a asymmetric cryptographic algorithm, You need one key for encryption and one key for decryption
So you need Private key to recover your files.
It’s not possible to recover your files without private key
#How to get private key?
You can get your private key in 3 easy step:
Step1: You must send us 1,7 Bitcoin for each affected PC or 29 BitCoins to receive ALL Private Keys for ALL affected PCs.
Step 2: After you send us 1,7 Bitcoin, Leave a comment on our Site with this detail: Just write your “host name” in your comment.
* Your host name is: XXXXXXXXXXXX

However, paying the ransom is not recommended. Crooks are known for not giving working decryption software and putting victims into more significant problems. Therefore, it is recommended to remove SamSam ransomware instead of taking shady cybercriminals' offers to recover files. In some cases, malware fails to delete Shadow Volume Copies, and data can be restored with third-party tools, but first, you need to get rid of the virus.

SamSam ransomware illustrationSamSam is a dangerous cyber threat which continues to infect large-scale companies.

SamSam removal requires using anti-malware software. Use professional tools like Reimage Reimage Cleaner Intego or Malwarebytes to clean the affected device. However, if you cannot download or run security software, you should reboot the affected machine to Safe Mode with Networking as we have explained at the end of this article.

SamSam ransomware – a large scale business

SamSam ransomware authors rely on a strange code of “honesty and fairness.” Quite often, hackers use “Sorry” in the titles of their ransom notes, and also offer free decryption of several personal files. It seems like bad actors try to make others believe that that they are nice and friendly people, which is complete nonsense.

Nevertheless, SamSam managed to reach incredible highs throughout its existence, crippling large hospitals, city municipalities, and other large-scale organizations.

SamSam ransomware was detected after it infected several hospitals in the United States[4] in 2016. MedStar hospital was in the worst position after this ransomware attack because it was required to pay 45 Bitcoins or $18,500 in exchange for the encrypted data. Fortunately, IT specialists in this hospital managed to remove SamSam virus and find backups of encoded data and used them to recover affected files. Hence, cybercriminals did not receive the money. 

Therefore, the main targets of the malware are organizations and businesses. FBI has officially warned the corporations and companies to increase their cybersecurity.[5] According to the latest information, malware relies on the targeted attacks and does not seem to infect random computers. The functionality of the virus requires attackers participation – he or she has to enter a specific password to begin the attack.[6]

SamSam - a big businessSamSam ransomware already earned cybercriminals almost $6 million during its operation

Atlanta City attack – a devastating hit that cost $2.6 million

Atlanta suffered SamSam ransomware intrusion in March 2018, when the citizens of the city were unable to process certain actions:[7]

The City of Atlanta is currently experiencing outages on various customer facing applications, including some that customers may use to pay bills or access court-related information. We will post any updates as we receive them.

The infection affected five city departments out of 13, and employees were forced to connect personal computers in order to perform operations and deal with sensitive data. Additionally, some police records were lost in the attack.

The officials were given two choices: either pay $6,000 per infected machine or a whopping $51,000 to recover operation of all networks at once. While it is unknown if any of the demanded money was paid, the attackers quickly closed down the payment portal and left the city in havoc.

Atlanta ended up spending over $2.6 million for the damages caused by SamSam ransomware.

SamSam malware

LabCorp: SamSam ransomware hits one of the largest medical testing companies in US

LabCorp, one of the most prominent medical diagnostics company, has recently reported about a suspicious activity on their network on July 14.[8] At that time, IT specialists couldn't identify the cause of it. Although, now the official report from the LabCorp confirms about a ransomware attack, SamSam in particular. 

Luckily, security experts have managed to shut down affected parts of the system in 50 minutes and prevent further damage. Currently, the recovery process has started and the company already operates at 90-percent capacity. However, some clients may not be able to access test results as a result of SamSam ransomware attack. 

According to the analysis, SamSam virus was infiltrated on the company's network via Brute Force against Remote Desktop Protocol (RDP). Thanks to quick response by cybersecurity specialists, none of the customers' information was stolen. Although, the ransomware managed to encrypt the following parts of the network:

  • 7,000 systems;
  • 1,900 servers;
  • 350 production servers.

Sophisticated infections are distributed in multiple ways

The key difference of this file-encrypting from other ransomware-type infections is that it uses targeted attacks. In other terms, it does not aim to infect the computers of regular users rather than target large-scale organizations. Thus, the developers of the virus create unique spam emails to infiltrate the networks of well-known firms. 

This threat has been distributed using other methods too. The most shocking discovery is that this virus has been relying on vulnerability found in JBoss application. Alternatively known as WildFly,[9] it helped the virus infect the entire network and invade several computers at the same time. 

SamSam ransomware website pictureSamSam ransomware has its own website to help victims pay the ransom. Although, it is not recommended under any circumstances.

When spreading with the help of this method, the virus uses a special tool called JexBossooks to look for JBoss vulnerabilities. Once the vulnerabilities are detected, it drops Trojan:BAT/Samas.B [10] and Trojan:BAT/Samas.C.[11] to steal personal credentials. After obtaining such data, the hackers launch their ransomware as a psexec.exe file and initiate the attack of the ransomware. 

Therefore, to avoid ransomware attack, you have to:

  • Be careful with received emails and do not rush opening any attached files;
  • Install all software and OS updates to avoid exploitation of vulnerabilities;
  • Download updates and security patches from the official websites.

Perform the following steps to remove SamSam ransomware from your device

It is evident that the attackers try their best to create an infection which is persistent. Therefore, SamSam ransomware removal process is not an easy task. Although, professional security tools can significantly help with the elimination of this cyber threat.

We suggest eliminating the virus with one of these programs Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes. Security programs cannot only delete all ransomware-related files but keep your computer protected from cyber threats in the future. 

For it to maintain its functionalities flawlessly, you need to update the software daily. If you cannot remove SamSam virus because of the inability to launch the security program or access other important OS programs, take a look at the recovery guidelines below.

You should also create a safe environment on your computer before initiating Samsam removal. To help you protect your registry entries and similar components, we prepared a video guide to show you how it is done:

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove SamSam virus, follow these steps:

Remove SamSam using Safe Mode with Networking

In some cases, ransomware prevents users from accessing or running security programs. Thus, you have to reboot your computer to the Safe Mode with Networking as shown below to start its removal. Then repeat system scan.

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove SamSam

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete SamSam removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove SamSam using System Restore

System Restore method can also help you disable the virus in order to run automatic ransomware removal. For that, use the following steps:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of SamSam. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that SamSam removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove SamSam from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by SamSam ransomware, you can try decrypting them only after you remove the ransomware. For that, make sure you choose one of the following methods:

If your files are encrypted by SamSam, you can use several methods to restore them:

Recover your files encrypted by SamSam virus with the help of Data Recovery Pro

If you are infected with SamSam virus, you can try using Data Recovery Pro to recover your encrypted files. This application is widely known for helping people revive their accidentally deleted files and similar data.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by SamSam ransomware;
  • Restore them.

Use Windows Previous Versions feature to recover separate files encrypted by SamSam ransomware

If you have files that are very important to you, you can try recovering them with the help of Windows Previous Versions feature. However, to use it, you need to make sure that System Restore function was enabled before the appearance of SamSam.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

SamSam decrypter

At the moment, there is a SamSam decrypter available on the Internet, however, since Google SafeBrowsing considers it dangerous, we cannot share a link to it here. We will update the article as soon as a 100% safe and official decrypter appears. Be patient!

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from SamSam and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Do not let government spy on you

The government has many issues in regards to tracking users' data and spying on citizens, so you should take this into consideration and learn more about shady information gathering practices. Avoid any unwanted government tracking or spying by going totally anonymous on the internet. 

You can choose a different location when you go online and access any material you want without particular content restrictions. You can easily enjoy internet connection without any risks of being hacked by using Private Internet Access VPN.

Control the information that can be accessed by government any other unwanted party and surf online without being spied on. Even if you are not involved in illegal activities or trust your selection of services, platforms, be suspicious for your own security and take precautionary measures by using the VPN service.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Julie Splinters
Julie Splinters - Malware removal specialist

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Julie Splinters
About the company Esolutions

Removal guides in other languages

  1. BruceAl says:
    July 1st, 2016 at 4:58 am

    yeah..hospitals are the right companies to hijack. The hackers could aim at the black market instead.

  2. Roger48 says:
    July 1st, 2016 at 4:59 am

    They are becoming too powerful.

  3. Sammy says:
    July 1st, 2016 at 5:01 am

    So do anti-virus programs work?

  4. Liz says:
    July 1st, 2016 at 5:02 am

    Smart move. Now they are shifting to networks…

  5. Billy.Joel says:
    July 1st, 2016 at 5:03 am

    My friend got this virus packed in spam.

Your opinion regarding SamSam ransomware virus