Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

Hidden-Cry Ransomware (.Syrk)

  • Distribution Method : Unknown
 
  • MD5 : da6b7ddd28dc387bcd10b180c9bdff58
 
  • Major Detection Name : Ransom.Syrk (Malwarebytes), Ransom:MSIL/Syrk.AD (Microsoft)
 
  • Encrypted File Pattern : .Syrk
 
  • Malicious File Creation Location :
     - C:\Users\Default\AppData\Local\Microsoft\+dp-.txt
     - C:\Users\Default\AppData\Local\Microsoft\+dp-.txt
     - C:\Users\Default\AppData\Local\Microsoft\-pw+.txt
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SydneyFortniteHacks.exe
     - C:\Users\%UserName%\Desktop\Readme_now.txt
     - C:\Users\%UserName%\Documents\WindowsPowerShell
     - C:\Users\%UserName%\Documents\WindowsPowerShell\Modules
     - C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher
     - C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher\Cipher.psm1
     - C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher\cry.ps1
     - C:\Users\Public\Documents\cgo46ea565sdfse7.exe
     - C:\Users\Public\Documents\DeleteFile.exe
     - C:\Users\Public\Documents\delmy.exe
     - C:\Users\Public\Documents\LimeUSB_Csharp.exe
     - C:\Users\Public\Documents\startSF.exe
     - C:\Users\Public\Documents\SydneyFortniteHacks.exe
 
  • Payment Instruction File : Readme_now.txt
 
  • Major Characteristics :
     - PowerShell-based Ransomware (powershell -ExecutionPolicy ByPass -File C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher\cry.ps1)
     - Turns off User Access Control (UAC)
     - Changes Folder Option
     - Disable Windows Defender (DisableAntiSpyware)
     - Block processes execution (ProcessHacker, Procmon64, Taskmgr)
     - USB Drive propagation using LimeUSB_Csharp.exe file.
     - Changes desktop background (C:\51875.jpg)

List

위로