Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : 웹 사이트 접속 시 취약점(Exploit)을 이용한 자동 감염

 

  • MD5 : 23ea52065c7ec15630f09bcc80f41722

 

  • Major Detection Name : Ransom.CryptoMix (Malwarebytes), Ransom:Win32/HydraCrypt.A (Microsoft)

 

  • Encrypted File Pattern : .id_(Random)_email_enc10@dr.com_.rmd

 

  • Malicious File Creation Location: : C:\ProgramData\FlashPlayerPlugin_(Random)_(Random).exe

 

  • Payment Instruction File : # HELP_DECRYPT_YOUR_FILES #.TXT

 

  • Major Characteristics : 오프라인 암호화(Offline Encryption), CryptoMix / HydraCrypt / Zeta Ransomware 계열, 데이터 편집기 명령어를 통한 부팅 복구 방해(bcdedit /set {default} recoveryenabled No, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set bootstatuspolicy ignoreallfailures, bcdedit /set recoveryenabled NO) 및 시스템 백업 삭제(wbadmin delete catalog -quiet)

List

위로