Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 716c502ba250f742fc935b3cb223ca4a
 
  • Major Detection Name : a variant of Win32/Filecoder.Outsider.C (ESET), Ransom/Horsedeal (McAfee)
 
  • Encrypted File Pattern : .horsedeal
 
  • Malicious File Creation Location : C:\Users\%UserName%\AppData\Roaming\_uninstalling_.png
 
  • Payment Instruction File : #Decryption#.txt
 
  • Major Characteristics :
     - Offline Encryption
     - Outsider Ransomware series
     - Use a "Microsoft Code Signing PCA 2010" Digital Signatures
     - Turns off Windows Firewall (netsh advfirewall set allprofiles state off)
     - Block processes execution (dbsnmp.exe, msftesql.exe, oracle.exe, sqlagent.exe, synctime.exe, thebat64.exe etc.)
     - Disable system restore (vssadmin.exe delete shadows /all /quiet, bcdedit /set {current} bootstatuspolicy ignoreallfailures, bcdedit /set {current} recoveryenabled no)
     - Changes desktop background (C:\Users\%UserName%\AppData\Local\Temp\<Random>.tmp.jpg)

List

위로