Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 057aad993a3ef50f6b3ca2db37cb928a
 
  • Major Detection Name : Trojan/Win32.SatanCryptor.C3864467 (AhnLab V3), Generic.Ransom.SatanCrypt.C7F35B64 (BitDefender)
 
  • Encrypted File Pattern : #_THIS_FILE_IS_ENCRYPTED_[<Random>]-[ID-<Random>]-[EMAIL-MREncptor@protonmail.com].satan
 
  • Malicious File Creation Location :
     - C:\Windows\Temp\satan
     - C:\Windows\Temp\satan\satan0
     - C:\Windows\Temp\satan\satan1
 
  • Payment Instruction File : # SATAN CRYPTOR #.hta
 
  • Major Characteristics :
     - Offline Encryption
     - DBGer / Lucky Ransomware series

List

위로