Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 51458351a5d347b99bd78a3f93d9008d
 
  • Major Detection Name : Ransom.FileL0cker (Malwarebytes), Ransom:MSIL/BlackHeart!MTB (Microsoft)
 
  • Encrypted File Pattern : .[fileslocker@pm.me]
 
  • Payment Instruction File : #解密我的文件#.TXT / #DECRYPT MY FILES#.TXT
 
  • Major Characteristics :
     - Offline Encryption
     - The Chinese and English users targeted
     - Disable system restore (vssadmin.exe delete shadows /all /quiet)
     - Encryption guide using Text-to-Speech (TTS) function
     - Changes desktop background (C:\Users\%UserName%\Desktop\WallPaper.bmp)

List

위로