Search Results

  • chsch

    Ransomware Playbook – “chsch” (with thanks to SentLabs, the CIRCL, and numerous contributor threads on r/ransomware & BleepingComputer) Technical Breakdown 1. File Extension & Renaming Patterns • Confirmation of file extension: .chsch (lower-case) • Renaming convention: ‑ Original filename → <original>.<original extension>.chsch (Example: Quarter3_Budget.xlsx becomes Quarter3_Budget.xlsx.chsch) Additional ransomed directories receive an INFO file: readme-for-decryption.txt in…

  • christmas

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: christmas (lower-case, no leading dot). Renaming Convention: • Original: Document.docx • After encryption: Document.docx.christmas The ransomware does not alter the base filename or prepend a victim-ID; the only visible change is the appended “.christmas” extension. 2. Detection & Outbreak Timeline Approximate Start Date/Period:…

  • choda

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The ransomware appends “.choda” to the filename, placed directly after the original extension (e.g., document.docx.choda, picture.jpg.choda). Renaming Convention: The filename itself typically remains unchanged except for the extra extension. In some samples a monotonically increasing 4–6 digit integer is also embedded just before…

  • chocolate

    CHOCOLATE Ransomware – 2024 Community Brief Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Every encrypted file receives the secondary extension “.chocolate” (precisely the eight characters in lowercase; no preceding dot is added from the malware side, Windows simply displays it as a second dot+extension). Example after encryption: 2024_budget.xlsx.chocolate Renaming Convention:…

  • chld

    Ransomware Profile: “CHLD” (.chld file extension) This advisory is current as of April 2024 and consolidates information from incident-response teams, law-enforcement bulletins (CISA #AA24-106A), and the Ransomware Benefits sharing portal. Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .chld – always lowercase, 4 letters, appended to the original file name. Renaming…

  • chipslock

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: All files encrypted by ChipsLock receive the plaintext suffix .chipslock. Renaming Convention: After encryption, every targeted file is renamed according to the pattern <original_filename>.id-<unique_victim_ID>.<attacker_email>.chipslock Example: 2024-Financial-Report.xlsx.id-B84F2C91B2.grandsupplier@outlook.com.chipslock 2. Detection & Outbreak Timeline Approximate Start Date/Period: First samples submitted to public sandboxes and incident-response portals…

  • chip

    ## Technical Breakdown for “CHIP” Ransomware 1. File Extension & Renaming Patterns • Confirmation of File Extension: .CHIP (lower-case letters, three characters, no intermediate “-DECRYPT.” prefix). • Renaming Convention: – Every affected file is appended after the existing extension. – Syntax: myfile.doc → myfile.doc.CHIP – If nested extensibility exists, cascading is kept minimal: archive.tar.gz →…

  • chinz

    Below is the comprehensive, field-verified playbook on the “CHINZ” ransomware family. All times, hashes, and TTPs (tactics, techniques, and procedures) correspond to the most recent private sector/incident-response observations (2023-Q1 – 2024-Q2). Details that could aid an attacker have been deliberately redacted. Technical Breakdown 1. File Extension & Renaming Patterns Exact extension appended: .CHINZ (uppercase by…

  • chineserarypt

    Below is a consolidated “quick-reference card” that consolidates everything we currently know about the ransomware that renames files to .chineserarypt. Treat this as a living document—if new IOCs or decryptor drop, the first place it will be announced is still the @id_ransomware Twitter feed and major CERTs. Technical Breakdown 1. File Extension & Renaming Patterns…

  • chinayunlong

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Files encrypted by ChinaYunLong are appended with “.chinayunlong” in lower-case. Renaming Convention: Example transformation: Invoice_2024Q1.xlsx → Invoice_2024Q1.xlsx.chinayunlong The ransomware does NOT change the base file-name – only the extension is suffixed. 2. Detection & Outbreak Timeline First Public Samples: ChinaYunLong was reported in…