Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : dd57632c90ca46b42d00335c42215a87
 
  • Major Detection Name : Ransom:MSIL/Hardbit.SK!MTB (Microsoft), Ransom.Hardbit (Norton)
 
  • Encrypted File Pattern : <Random>.[id-<Random>].[legion@tfwno.gf].hardbit3
 
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Local\Temp\sd.vbs
     - C:\Users\%UserName%\AppData\Local\Temp\sd2.vbs
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates\hrdb.ico
     - C:\Help_me_for_Decrypt.hta
 
  • Message File : Help_me_for_Decrypt.hta / How To Restore Your Files.txt
 
  • Major Characteristics :
     - Offline Encryption
     - Disable Microsoft Defender
     - Stop multi services (EraserSvc11710, macmnsvc, PDVFSService, Sophos Device Control Service, SQLAgent$SYSTEM_BGC, Zoolz 2 Service etc.)
     - Delete multi services (MsDtsServer130, MSSQLFDLauncher, ReportServer, storflt, TMBMServer, vmickvpexchange, VSS etc.)
     - Disable system restore (vssadmin Delete Shadows /all /quiet, wbadmin delete catalog -quiet, wmic shadowcopy delete, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no)
     - Change encrypted file (.hardbit3) icon (HKEY_CLASSES_ROOT\.hardbit3)
     - Changes desktop background (C:\Users\%UserName%\Desktop\HARDBIT.jpg)

List

위로