Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

ShellLocker Ransomware (<Random Filename>.L0cked)

  • Distribution Method : Unknown

 

  • MD5 : 2be6385e5159210716681f59b64aef1e

 

  • Major Detection Name : Trojan-Ransom.Win32.Gen.la (Kaspersky), Ransom_EXOSHELL.A (Trend Micro)

 

  • Encrypted File Pattern : <Random Filename>.L0cked

 

  • Malicious File Creation Location: : C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe

 

  • Major Characteristics :
     - Offline Encryption
     - Exotic Ransomware series
     - Generate a lock screen when encrypting files
     - Changes desktop background (C:\Users\%UserName%\AppData\Local\Tempimage.jpg)

List

위로