Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

Hentai Onichan Ransomware (.docm / readmerecovery.txt / Last Version Real OniHentai)

  • Distribution Method : Unknown
 
  • MD5 : 6478ba983b659f00466da5dd61bf9768
 
  • Major Detection Name : Ransomware/Win.TAIHENCHAN.C4534360 (AhnLab V3), W64/Donut.VF!tr.ransom (Fortinet)
 
  • Encrypted File Pattern : .docm
 
  • Payment Instruction File : readmerecovery.txt
 
  • Major Characteristics :
     - Offline Encryption
     - Use a "Microsoft Windows" Digital Signatures
     - Disable and Blocks Task Manager (Taskmgr.exe)
     - Block processes execution (dnSpyx64.exe, joeboxcontrol.exe, pe-sieve64.exe, procexp32.exe, sysAnalyzer.exe, wireshark.exe etc.)
     - Deletes event log (wevtutil.exe cl "Analytic", wevtutil.exe cl "Application", wevtutil.exe cl "DebugChannel", wevtutil.exe cl "DirectShowFilterGraph", wevtutil.exe cl "DirectShowPluginControl", wevtutil.exe cl "Els_Hyphenation/Analytic" etc.)
     - Disable system restore (wbadmin delete catalog -quiet, wbadmin DELETE SYSTEMSTATEBACKUP, wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest, wmic SHADOWCOPY delete, vssadmin Delete Shadows /all /quiet, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled No, vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=401MB, vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=unbounded)
     - Changes desktop background (C:\Windows\System32\spool\drivers\color\meme.jpg)

List

위로