Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Mail attachment (.pdf)
 
  • MD5 : 0a03c3bdae435d282508a3870bb825e7
 
  • Major Detection Name : Trojan-Ransom.Win32.Jaff.g (Kaspersky), Ransom:Win32/Jaffrans!rfn (Microsoft)
 
  • Encrypted File Pattern : .wlu
 
  • Malicious File Creation Location :
         - C:\ProgramData\Rondo
         - C:\ProgramData\Rondo\backup.om
         - C:\ProgramData\Rondo\WallpapeR.bmp
         - C:\Users\%UserName%\AppData\Local\Temp\acrord32_sbx\<Random>_<Random>_<Random>.tmp\RNOHLIAFU.docm
         - C:\Users\%UserName%\AppData\Local\Temp\levinsky8.exe
         - C:\Users\%UserName%\AppData\Local\Temp\lodockap8
 
  • Payment Instruction File : README_TO_DECRYPTl.bmp / README_TO_DECRYPT.html / README_TO_DECRYPTl.txt
 
  • Major Characteristics :
         - Offline Encryption
         - Locky Ransomware series
         - Changes desktop background (C:\ProgramData\Rondo\WallpapeR.bmp)

List

위로