Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Automatic infection using exploit by visiting website
 
  • MD5 : 336e08f86fffdbc7d3131cdad53c61b8 / d4829f54c127048520312aafe0c9bbaa
 
  • Encrypted File Pattern : .<Random Extension>
 
  • Malicious File Creation Location : C:\Users\Public\readme.txt
 
  • Payment Instrucition File : readme.txt
 
  • Major Characteristics :
     - Fileless-based Ransomware
     - File encryption using explorer.exe or iexplore.exe system files
     - After Encryption, launches event viewer(eventvwr.exe) which automatically connects to open website (pcalua.exe -a http://<random>.dailybe.website/<random>) and opens ransom note (pcalua.exe -a notepad.exe -c C:\Users\Public\readme.txt)

List

위로