Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : fa2bbdc9ca477ce677abaee2d408981f
 
  • Major Detection Name : Ransom:Win32/Betisrypt.A (Microsoft), Ransom_BTCWARE.F117DQ (Trend Micro)
 
  • Encrypted File Pattern : .[no.btc@protonmail.ch].cryptobyte
 
  • Malicious File Creation Location :
         - C:\Users\%UserName%\AppData\Roaming\#_HOW_TO_FIX.inf
         - C:\Users\%UserName%\AppData\Roaming\mfskSkfkls.exe
         - C:\Users\USPC10\Desktop\key.dat
 
  • Payment Instruction File : #_HOW_TO_FIX.inf
 
  • Major Characteristics :
         - Offline Encryption
         - Crptxxx Ransomware series
         - Changes desktop background (C:\Users\%UserName%\AppData\Roaming\1.bmp)

List

위로