Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 6311af2c39159e6ddca4838d64a35076
 
  • Encrypted File Pattern : .LEETCRY
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Roaming\enc_test.txt
     - C:\Users\%UserName%\AppData\Roaming\encrypted_files.txt
     - C:\Windows\System32\Tasks\updater47
 
  • Major Characteristics :
     - Offline Encryption
     - FlyBox Ransomware series
     - Reruns by adding "updater47" in Task Scheduler to disable system restore (vssadmin Delete Shadows /All /Quiet)

List

위로