Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 8d7da99f1beaeee4fd8fc6264f0c4471
 
  • Major Detection Name : Ransom.Cryptolocker (Norton), Ransom_CRYPTOWIRE.E (Trend Micro)
 
  • Encrypted File Pattern : <Original Filename>.realfs0ciety@sigaint.org.fs0ciety.<Original Extension>
 
  • Malicious File Creation Location :
         - C:\Program Files (x86)\Common Files\<Random>.exe
         - C:\Program Files (x86)\Common Files\update.txt
 
  • Major Characteristics :
         - Offline Encryption
         - Owl / UltraLocker Ransomware series
         - Verified to same email address used for Fsociety ransomware

List

위로