Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : df8fb6a420992251592f15877f1cd5a8
 
  • Major Detection Name : Ransom.SpartCrypt (Malwarebytes), Ransom:Win32/Higuniel.A (Microsoft)
 
  • Encrypted File Pattern : .SpartCrypt[LordCracker@protonmail.com]-[ID-<Random>].Encrypted
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\How_To_Restore_Your_Files.txt
     - C:\Users\%UserName%\AppData\Roaming\Temp (x86)
     - C:\Users\%UserName%\AppData\Roaming\Temp (x86)\info.hta
     - C:\Users\%UserName%\AppData\Roaming\Temp (x86)\SINFO.txt
     - C:\Users\%UserName%\Desktop\How_To_Restore_Your_Files.txt
     - C:\Users\%UserName%\Desktop\info.hta
 
  • Payment Instruction File : How_To_Restore_Your_Files.txt / info.hta
 
  • Major Characteristics : Offline Encryption

List

위로