Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

Satan v2.2 Ransomware (.satan / How_to_decrypt_files.txt)

  • Distribution Method : Unknown
 
  • MD5 : fcea2a29fdbd6c698ea3a37de413a812
 
  • Major Detection Name : Ransom.SatanCryptor (Malwarebytes), Ransom.Satan (Norton)
 
  • Encrypted File Pattern : .satan
 
  • Malicious File Creation Location :
     - C:\ST_V22
     - C:\ST_V22\KSession
     - C:\How_to_decrypt_files.txt
 
  • Payment Instruction File : How_to_decrypt_files.txt
 
  • Major Characteristics :
     - Offline Encryption
     - DBGer Ransomware series
     - Chinese, English, and Korean users targeted
     - Block processes execution (mysqld.exe, nmesrvc.exe, oracle.exe, sqlagent.exe, sqlservr.exe, sqlwriter.exe etc.)

List

위로