Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
 
  • MD5 : 130c887ba694f81ba3b20bdea52e6a8c
 
  • Major Detection Name : Ransom.RSAUtil (Malwarebytes), Ransom_DONTSLIP.D (Trend Micro)
 
  • Encrypted File Pattern : .[alexjer554@gmx.com].ID<Random>
 
  • Malicious File Creation Location :
     - ...\cripter\Clearr.cmd
     - ...\cripter\config.cfg
     - ...\cripter\DECODE_ALL_FILES.bat
     - ...\cripter\DesktopImg
     - ...\cripter\How_return_files.txt
     - ...\cripter\image.jpg
     - ...\cripter\INFOFILE
     - ...\cripter\libeay32.dll
     - ...\cripter\msvcr90.dll
     - ...\cripter\NE SPAT.bat
     - ...\cripter\start_notepad.bat
     - ...\cripter\svhosts.exe
 
  • Payment Instruction File : How_return_files.txt
 
  • Major Characteristics :
     - Offline Encryption
     - Disable system restore (vssadmin.exe delete shadows /all /quiet, bcdedit.exe /set {default} recoveryenabled no, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures)
     - Delete event log
     - Changes desktop background (...\cripter\image.jpg)

List

위로