Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : fb334f228836443b250acdab2749cad9
 
  • Major Detection Name : Gen:Variant.Ransom.PGPSnippet.1 (BitDefender), Ransom_CYPEN.THFAAAH (Trend Micro)
 
  • Encrypted File Pattern : .digiworldhack@tutanota_com
 
  • Malicious File Creation Location :
     - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\!!!README_DECRYPT!!!.txt
     - C:\Users\%UserName%\AppData\Roaming\FrameworkLog
     - C:\Users\%UserName%\AppData\Roaming\FrameworkLog\Logs.txt
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!README_DECRYPT!!!.txt
     - C:\Users\%UserName%\AppData\Roaming\host.txt
     - C:\Users\%UserName%\AppData\Roaming\KBFilt.exe
 
  • Payment Instruction File : !!!README_DECRYPT!!!.txt
 
  • Major Characteristics : Offline Encryption

List

위로