Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Automatic infection using exploit by visiting website
 
  • MD5 : 67014122a38c627ca88d2df063ecdca6
 
  • Major Detection Name : Trojan/Win32.Gandcrab.C2400290 (AhnLab V3), Ransom.GandCrab (Norton)
 
  • Encrypted File Pattern : .CRAB
 
  • Payment Instruction File : CRAB-DECRYPT.txt
 
  • Major Characteristics :
         - Fileless-based Ransomware
         - File encryption using "C:\Windows\explorer.exe" system file
         - Block processes execution (msftesql.exe, oracle.exe, sqlagent.exe, sqlbrowser.exe, sqlservr.exe, sqlwriter.exe etc.)
         - Automatically reboot Windows after file encryption is complete

List

위로