Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 413770ba14b8df7a7f291aef9e1b5af1
 
  • Major Detection Name : Ransom.Rapid (Malwarebytes), Ransom:Win32/Robinhood.AR!MTB (Microsoft)
 
  • Encrypted File Pattern : <Random Filename>.cryptolocker
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Roaming\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}
     - C:\Users\%UserName%\AppData\Roaming\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\norapid.exe
     - C:\Users\%UserName%\AppData\Roaming\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\rapidrecovery.txt
     - C:\Windows\System32\Tasks\SvcSafeData
 
  • Payment Instruction File : !DECRYPT_FILES.txt / rapidrecovery.txt
 
  • Major Characteristics :
     - Offline Encryption
     - Disable and Blocks Command Prompt (cmd.exe) and Task Manager (Taskmgr.exe)
     - Delete multi services (MsDtsServer130, MSSQLFDLauncher, ReportServer, SQLSERVERAGENT, storflt, vmickvpexchange etc.)
     - Block processes execution (fdlauncher.exe, msmdsrv.exe, pg_ctl.exe, ReportingServicesService.exe, sqlbrowser.exe, UniFi.exe etc.)
     - Delete backup files (*.bac, *.bak, *.bkf, *.dsk, *.set, *.VHD, *.wbcat, *.win, Backup*.*)
     - Disable system restore (vssadmin.exe Delete Shadows /All /Quiet, bcdedit.exe /set {default} recoveryenabled No, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures, wbadmin DELETE, SYSTEMSTATEBACKUP, wmic SHADOWCOPY DELETE, vssadmin.exe resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=401MB, vssadmin.exe resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=unbounded)
     - Adds SvcSafeData to scheduler to execute "%AppData%\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\norapid.exe" every minute
     - Changes desktop background (%AppData%\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\kakdela.bmp)

List

위로