Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 8325e1443e414d2d88a080e58244abef
 
  • Major Detection Name : Trojan/Win32.Ransom.C2488314 (AhnLab V3), a variant of MSIL/Kryptik.MPF (ESET)
 
  • Encrypted File Pattern : .ransom
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\Desktop\README_TO_DECRYPT_FILES.html
     - C:\Users\Public\r44s_<Year>-<Month>-<Day> <Hour & Minute>.exe
 
  • Payment Instruction File : LEAME_PARA_DESCIFRAR_ARCHIVOS.txt / LEESMIJ-BESTAND_VOOR_HET_DECODEREN_VAN_BESTANDEN.txt / LEGGIMI_PER_DECIFRARE_I_FILES.txt / LESEN_SIE_MICH_UM_DATEIEN_ZU_ENTSCHLUSSELN.txt /  LISEZ-MOI_POUR_DECHIFFRER_LES_FICHIERS.txt / PROCHTI_MENYA_DLYA_RASSHIFROVKI_FAYLOV.txt / README_TO_DECRYPT_FILES.html / README_TO_DECRYPT_FILES.txt / شروع_رمزگ_شایی.txt / 重新解密文件.txt
 
  • Major Characteristics :
     - Hidden-Tear open source based ransomware
     - Guide a payment instrucition in 9 languages including Chinese and English.
     - Changes desktop background (C:\Users\%UserName%\Desktop\wallpaper.jpg)

List

위로