Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 3c03b58f0c7263be50c6c91d2e582562
 
  • Major Detection Name : Generic.MSIL.Ransomware.Jigsaw.E80780D9 (BitDefender), Ransom.Jigsaw.Generic (Malwarebytes)
 
  • Encrypted File Pattern : .##___POLICJA!!!___TEN_PLIK_ZOSTAŁ_ZABLOKOWANY!!!___
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Local\Microsoft Office
     - C:\Users\%UserName%\AppData\Local\Microsoft Office\Activation Settings
     - C:\Users\%UserName%\AppData\Local\Microsoft Office\Activation Settings\dllhost.exe
     - C:\Users\%UserName%\AppData\Roaming\Adobe Reader
     - C:\Users\%UserName%\AppData\Roaming\Adobe Reader\svchost.exe
     - C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)
     - C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)\BTC__ADDRESS.txt
     - C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)\dr
     - C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)\EncryptedFileList.txt
 
  • Major Characteristics :
     - Offline Encryption
     - Ramsey Ransomware series
     - The Polish users are targeted.
     - Create a fake ".NET Framework Initialization Error" message
     - Automatically delete encrypted files every hour

List

위로