{"id":12661,"date":"2016-07-25T08:00:33","date_gmt":"2016-07-25T12:00:33","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=12661"},"modified":"2021-03-17T10:32:12","modified_gmt":"2021-03-17T14:32:12","slug":"shade-decryptor","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/shade-decryptor\/12661\/","title":{"rendered":"No More Ransom"},"content":{"rendered":"<p>Last year, we joined forces with Dutch law enforcement to launch the <a href=\"http:\/\/noransom.kaspersky.com\" target=\"_blank\" rel=\"noopener\">NoRansom<\/a> website, which helps victims of CoinVault ransomware restore access to their data. Later, we enhanced the website with a couple of other free tools to restore files encrypted by other cryptors such as TeslaCrypt, CryptXXX, and others like them.<\/p>\n<p>Today we\u2019re taking another big step in our crusade against ransomware. Together with the Dutch police, Europol, and Intel Security, we created <a href=\"https:\/\/www.nomoreransom.org\/?utm_medium=blg&amp;utm_source=kd_post_160725&amp;utm_campaign=ww_kl_release\" target=\"_blank\" rel=\"noopener nofollow\">NoMoreRansom.org<\/a>, a website where we plan to aggregate the widest selection of decryptors available anywhere.<\/p>\n<p>We are starting by adding another virus cure to the website \u2014 one to help victims of <a href=\"https:\/\/securelist.com\/analysis\/publications\/72087\/the-shade-encryptor-a-double-threat\/\" target=\"_blank\" rel=\"noopener\">Shade ransomware<\/a> to restore their files. We offer it, like the others, free of charge.<\/p>\n<h3>Shade<\/h3>\n<p>Shade is a family of ransomware cryptors that emerged in early 2015. Shade Trojans use malicious spam or <a href=\"https:\/\/www.kaspersky.com\/blog\/exploits-problem-explanation\/9448\/\" target=\"_blank\" rel=\"noopener nofollow\">exploit kits<\/a> as primary attack vectors. The latter is the more hazardous method because a victim does not have to open any files \u2014 a single visit to an infected website does the trick.<\/p>\n<p>When the ransomware infiltrates a victim\u2019s system, the Trojan requests an encryption key from the criminal\u2019s command-and-control (C&amp;C) server \u2014 or, should the server be unavailable, uses one of the keys embedded in advance. That means, even if the PC is disconnected from the Internet, the ransomware functions, provided it\u2019s already in the system.<\/p>\n<p>The malware then starts encrypting files. It affects more than 150 formats, including Microsoft Office files, images, and archives. When encrypting, Shade adds a .xtbl or .ytbl extension to the file name. Once the encryption process is complete, a ransom note appears on the screen.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021814\/shade-ransom-demand.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-12666\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021814\/shade-ransom-demand.png\" alt=\"Shade cryptor ransom demand\" width=\"1366\" height=\"768\"><\/a><\/p>\n<p>As if the file encryption was not bad enough, the ransomware continues on its rampage: While the victim panics and searches for a decryptor \u2014 or money for ransom \u2014 Shade keeps busy, downloading other malware onto the compromised PC.<\/p>\n<h3>Get the free decryptor<\/h3>\n<p>If you were unlucky enough to fall victim to Shade, we have a spot of good news for you: We can spare you the temptation to pay ransom to get your encrypted files back. Here\u2019s what to do:<\/p>\n<p>1. Go to <a href=\"https:\/\/www.nomoreransom.org\/decryption-tools.html?utm_medium=blg&amp;utm_source=kd_post_160725&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener nofollow\">NoMoreRansom.org<\/a>.<\/p>\n<p>2. Scroll down and find the two download buttons for decryptors. You may choose the decryptor from Intel Security or Kaspersky Lab. The following instructions are for our own decryptor, however.<\/p>\n<p>3. Unzip the downloaded file, ShadeDecryptor.zip.<\/p>\n<p>4. Run <b>ShadeDecryptor.exe<\/b>.<\/p>\n<p>5. In the Kaspersky ShadeDecryptor window, click <b>Change Parameters<\/b>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021819\/kaspersky-shade-decryptor-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-12663\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021819\/kaspersky-shade-decryptor-1.jpg\" alt=\"Shade decryptor user manual\" width=\"769\" height=\"705\"><\/a><\/p>\n<p>6. Choose which drives the utility should check for encrypted files.<\/p>\n<p>7. In the same window, you may also choose \u201cDelete crypted files after decryption,\u201d but we do not recommend doing that until you are 100% sure your files have been restored.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021817\/kaspersky-shade-decryptor-2.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-12664\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021817\/kaspersky-shade-decryptor-2.jpg\" alt=\"Shade decryptor user manual\" width=\"768\" height=\"705\"><\/a><\/p>\n<p>8. Click \u201c\u041e\u041a\u201d to return to the main screen. Click <b>Start scan<\/b>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021816\/kaspersky-shade-decryptor-3.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-12665\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/07\/06021816\/kaspersky-shade-decryptor-3.jpg\" alt=\"Shade decryptor user manual\" width=\"769\" height=\"705\"><\/a><\/p>\n<p>9. In the \u201cSpecify the path to one of encrypted files\u201d window, choose one of the encrypted files and click \u201cOpen.\u201d<\/p>\n<p>10. If the utility says it cannot automatically detect the victim\u2019s ID, specify the file path to the <b>readme.txt<\/b> file, which is essentially the ransom note and which contains the ID in question.<\/p>\n<p>Now your files should be decrypted. Enjoy the money you just saved! And to protect yourself from ransomware attacks in the future, use a robust security solution, such as <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>. For additional guidance on ransomware check out <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-10-tips\/10673\/\" target=\"_blank\" rel=\"noopener nofollow\">this post<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.<\/p>\n","protected":false},"author":421,"featured_media":12662,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,2683,9],"tags":[1680,1733,1735,1734,420,1732,723],"class_list":{"0":"post-12661","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-threats","9":"category-tips","10":"tag-cryptors","11":"tag-decryptors","12":"tag-manual","13":"tag-nomoreransom","14":"tag-ransomware","15":"tag-shade","16":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/shade-decryptor\/12661\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/shade-decryptor\/7441\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/shade-decryptor\/7470\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/shade-decryptor\/7427\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/shade-decryptor\/8770\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/shade-decryptor\/8664\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/shade-decryptor\/12591\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/shade-decryptor\/2277\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/shade-decryptor\/5903\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/shade-decryptor\/6426\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/shade-decryptor\/8305\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/shade-decryptor\/12072\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/shade-decryptor\/12591\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/shade-decryptor\/12661\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/shade-decryptor\/12661\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cryptors\/","name":"cryptors"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12661"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12661\/revisions"}],"predecessor-version":[{"id":39060,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12661\/revisions\/39060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12662"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}