Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : 웹 사이트 접속 시 취약점(Exploit)을 이용한 자동 감염

 

  • MD5 : 03efa23cb13898fdfda7821ea7dc5e10

 

  • Major Detection Name : Trojan/Win32.HydraCrypt.C1680806 (AhnLab V3), Trojan-Ransom.Win32.Fury.n (Kaspersky)

 

  • Encrypted File Pattern : .id_(Random)_email_enc9@dr.com_.scl

 

  • Malicious File Creation Location: : C:\ProgramData\FlashPlayerPlugin_(Random).exe

 

  • Payment Instruction File : # HELP_DECRYPT_YOUR_FILES #.TXT

 

  • Major Characteristics : 오프라인 암호화(Offline Encryption), CryptoMix / HydraCrypt / Zeta Ransomware 계열, 데이터 편집기 명령어를 통한 부팅 복구 방해(bcdedit /set {default} recoveryenabled No, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set bootstatuspolicy ignoreallfailures, bcdedit /set recoveryenabled NO) 및 시스템 백업 삭제(wbadmin delete catalog -quiet)

List

위로