Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Mail attachment (.wsf)
 
  • MD5 : e80c5368fa4395655be9a4ed9a6cfcc3
 
  • Major Detection Name : Ransom:Win32/SyncCrypt.A (Microsoft), Ransom_SYNCRYPT.A (Trend Micro)
 
  • Encrypted File Pattern : .kk
 
  • Malicious File Creation Location :
         - C:\Users\%UserName%\AppData\Local\Temp\BackupClient
         - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\readme.html
         - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\readme.png
         - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\sync.exe
         - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\tmp.bat
         - C:\Users\%UserName%\AppData\Local\Temp\DJeM9kE4.jpg
         - C:\Users\%UserName%\AppData\Local\Temp\DJeM9kE4.zip
         - C:\Users\%UserName%\Desktop\README
         - C:\Users\%UserName%\Desktop\README\AMMOUNT.txt
         - C:\Users\%UserName%\Desktop\README\KEY
         - C:\Users\%UserName%\Desktop\README\readme.html
         - C:\Users\%UserName%\Desktop\README\readme.png
         - C:\Windows\System32\Tasks\sync
 
  • Payment Instruction File : readme.html / readme.png
 
  • Major Characteristics :
         - Offline Encryption
         - Create a fake "Windows Script Host" message
         - Changes desktop background

List

위로