Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Automatic infection using exploit when accessing website, mail attachments (.js)
 
  • MD5 : fefedcf8301a2f5a82493566fda32947
 
  • Major Detection Name : W32/Zerber.DSUN!tr (Fortinet), Mal/FareitVB-M (Sophos)
 
  • Encrypted File Pattern : <Random>.<4-Digit Random Extension>
 
  • Malicious File Creation Location: : C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates\<Random>.exe
 
  • Payment Instruction File : _!!!_README_!!!_<Random>_.hta / _!!!_README_!!!_<Random>_.txt
 
  • Major Characteristics : Offline Encryption, File encryption from Offset 0x700 for the encryption target file, User Folder created in C drive root / Document / Desktop / Other Partition / USB Drive File Encryption, Generate payment instructions in 13 languages.

List

위로