Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : cc701a359594f2fecbfb5aa010edb7fa
 
  • Major Detection Name : Ransom:MSIL/BlackHeart!MTB (Microsoft), Ransom_FILESLOCKER.THAABGAH (Trend Micro)
 
  • Encrypted File Pattern : .[fileslocker@pm.me]
 
  • Payment Instruction File : #解密我的文件#.txt / #DECRYPT MY FILES#.txt
 
  • Major Characteristics :
     - Offline Encryption
     - The Chinese and English users targeted
     - Disable system restore (vssadmin.exe delete shadows /all /quiet)
     - Encryption guide using Text-to-Speech (TTS) function
     - Changes desktop background (C:\Users\%UserName%\Desktop\WallPaper.bmp)

List

위로