Search Results

  • clean

    clean Ransomware Resource – Technical & Recovery Guide Last updated: 2024-06-XX Technical Breakdown 1. File Extension & Renaming Patterns Exact extension used: .clean Renaming Convention Files are renamed in two predictable stages: Original file name → <base_name>.clean After full encryption completes, a second pass sometimes renames again to <base_name>.clean.random_id where random_id is an 8-hex-digit string…

  • clay

    Technical Breakdown: “Clay” Ransomware 1. File Extension & Renaming Patterns Confirmation of File Extension: ‑ Encrypts files and simply appends the four-character lowercase extension “.clay” to every affected file. Renaming Convention: ‑ Original file: “Report2024-05-10.xlsx” → Encrypted: “Report2024-05-10.xlsx.clay” ‑ No e-mail addresses, serial numbers, or other prefixes/suffixes are inserted in front of the extension. 2.…

  • cl0p

    cl0p Ransomware Community Resource Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .cl0p Renaming Convention: – The malware simply appends .cl0p to the original file name. – Example: Quarterly_Financial_Report.xlsx becomes Quarterly_Financial_Report.xlsx.cl0p. – No base-name changes, random characters, serial numbers, or email prefixes are introduced. 2. Detection & Outbreak Timeline Approximate Start…

  • ckey(randomid).email([email protected]).pack14

    Technical Breakdown: CKEY (a.k.a. Triple-M / Pack14 family) 1. File Extension & Renaming Patterns Confirmation of File Extension: The malware appends “.ckey< random-6-hexdigits >.email([email protected]).pack14” Example: AnnualReport.xlsx → AnnualReport.xlsx.ckeyB7A4F1.email([email protected]).pack14 Renaming Convention: Original file name is left intact. A dot (.) is added, followed by the literal string “ckey”, six hexadecimal characters, “.email(contact)”, and the hard-coded suffix…

  • ckey(ok5wfftq).email([email protected]).pack14

    Ransomware Profile: ckey(ok5wfftq).email([email protected]).pack14 Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The ransomware appends the compound extension .ckey(ok5wfftq).email([email protected]).pack14 to every encrypted file (all lower-case, no spaces, parentheses included). Renaming Convention: Original → <filename>.<original_extension>.ckey(ok5wfftq).email([email protected]).pack14 Example: Quarterly_Report.xlsx becomes Quarterly_Report.xlsx.ckey(ok5wfftq).email([email protected]).pack14 2. Detection & Outbreak Timeline Approximate Start Date/Period: First secure-sample submission and public forum…

  • ckae

    Comprehensive Ransomware Resource: Ckae (.ckae) Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: **.ckae** added as a secondary suffix after the original extension (e.g., invoice.pdf → invoice.pdf.ckae). Renaming Convention: The ransomware keeps the original file name and extension intact and simply appends “.ckae”. It does not alter the internal file header…

  • ck

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: ck – no leading dot is ever written; every encrypted file receives the two-letter suffix ck. Renaming Convention: [victim-id].[attacker-email-1].ck followed by a third element ([attacker-email-2].ck) in more recent builds. Plain example: original.docx → [email protected] or [email protected]@onionmail.org.ck 2. Detection & Outbreak Timeline Approximate Start…

  • cj

    ==================================================== Community Resource: CJDharma (“.cj”) Ransomware Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: The strain appends the literal three-bytes suffix .cj to every file it successfully encrypts. Example: Proposal_Q1.docx → Proposal_Q1.docx.cj Renaming Convention: The malware first captures the original file name and directory structure in its log. It then writes…

  • cizer

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The ransomware appends “.cizer” (lower-case, no spacing or prefix) to every encrypted file, e.g., Report_2024Q1.xlsx becomes Report_2024Q1.xlsx.cizer. Renaming Convention: Files are not moved to new directories—the original basename and path are preserved, only the final extension is added. Identical-name files in the same…

  • cityzone-*

    Comprehensive Guide to Combating the cityzone-* Ransomware Family Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .cityzone-* (where * is a 6-Hex_SHA1-of-RSA-PublicKey prefix, e.g. .cityzone-A4F2C9) Appendage style: <original_file>.id-[8-hex-chars].[email1_email2].cityzone-* Renaming Convention: • Encrypts file content with AES-256 + RSA-2048 (StrongCrypt®) • Keeps 4-part file-name structure: Original file name is preserved; id-[8-chars]. –…