Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

Vovalex Ransomware (.vovalex)

  • Distribution Method : Fake CCleaner Professional Installer
 
  • MD5 : 549590df4dc8875a8a2eb1386dd435e6
 
  • Major Detection Name : W64/Vovalex.58EA!tr.ransom (Fortinet), Ransom-Vovalex!549590DF4DC8 (McAfee)
 
  • Encrypted File Pattern : .vovalex
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Local\Temp\<Random>.exe
     - C:\Users\%UserName%\Desktop\README.VOVALEX.txt
 
  • Payment Instruction File : README.VOVALEX.txt
 
  • Major Characteristics :
     - Offline Encryption
     - The English and Russian users are targeted.

List

위로