Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 093d2634168cf168d59bfa49550a4010
 
  • Major Detection Name : Gen:Variant.Ransom.BitPaymer.9 (BitDefender), Trojan.Win32.Streamer.ea (Kaspersky)
 
  • Encrypted File Pattern : .locked
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Local\Temp\<Random>.cmd
     - C:\Users\%UserName%\AppData\Roaming\<Random>\<Random>.exe
     - C:\Users\%UserName%\AppData\Roaming\<Random>~1
     - C:\Users\%UserName%\AppData\Roaming\<Random>~1:bin
 
  • Payment Instruction File : <Original Filename>.<Original Extension>.readme_txt
 
  • Major Characteristics :
     - Offline Encryption
     - Creates executable ADS file. When this file executes, it replaces one of the windows service to ransomware itself.
     - Disable system restore (vssadmin.exe Delete Shadows /All /Quiet)

List

위로