Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 54465f04a6075b8e68f272d09b243e81
 
  • Major Detection Name : Ransom-Avest!54465F04A607 (McAfee), Trojan:MSIL/Genasom.A!MTB (Microsoft)
 
  • Encrypted File Pattern : .ckey(<Random>).email(data1992@protonmail.com).pack14
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\officeupdate.lnk
     - C:\Users\%UserName%\Documents\MyPictures
     - C:\Users\%UserName%\Documents\MyPictures\details.txt
     - C:\Users\%UserName%\Documents\MyPictures\office64.exe
 
  • Payment Instruction File : !!!Readme!!!Help!!!.txt
 
  • Major Characteristics :
     - Offline Encryption
     - Generate a fake Installer lock screen
     - Block processes execution (1c*, EXCEL*, mstsc.exe, notepad*, WINWORD*)

List

위로