Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Installation via AZORult malware
 
  • MD5 : 2409c058a86cd8743abb10a5735ef487
 
  • Major Detection Name : a variant of Win32/Kryptik.GIZG (ESET), Mal/GandCrab-B (Sophos)
 
  • Encrypted File Pattern : .Aurora
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Roaming\1337\AU3_EXE_2018-07-18_23-01.exe
     - C:\Users\%UserName%\AppData\Roaming\1337\Ransom_2018-07-18_23-06.exe
     - C:\Users\%UserName%\AppData\Roaming\1337\wall.i
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!-GET_MY_FILES-!.txt
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#RECOVERY-PC#.txt
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\@_RESTORE-FILES_@.txt
 
  • Payment Instruction File : !-GET_MY_FILES-!.txt / #RECOVERY-PC#.txt / @_RESTORE-FILES_@.txt
 
  • Major Characteristics : Changes desktop background (wall.i)

List

위로