Search Results

  • c0rp0r@c@0xr@

    c0rp0r@c@0xr@ Ransomware – Community Threat Intelligence & Recovery Guide Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Every encrypted file receives “.c0rp0r@c@0xr@” as its final extension. Renaming Convention: Original: Report ‑ Q2.docx After encryption: Report ‑ Q2.docx.c0rp0r@c@0xr@ The ransomware overwrites and thus deletes the original file—leaving only the encrypted copy. 2.…

  • c0hen

    c0hen Ransomware – Community Resource Guide Technical Breakdown 1. File Extension & Renaming Patterns Child File Extension: .c0hen — confirmed extension that replaces the original file extension of encrypted files (e.g., Project.xlsx becomes Project.xlsx.c0hen). Renaming Convention: Each file keeps its full original name plus the original extension, then <.c0hen> is appended once (no further cascading…

  • c0br4

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: .c0br4 (exact, case-sensitive “c-zero-b-r-four”). Renaming Convention: Original filename → <original_filename>.<original_extension>.c0br4. Example: Budget_2024.xlsx becomes Budget_2024.xlsx.c0br4. No appended random GUIDs or e-mails – the only change is the single trailing 5-byte extension. 2. Detection & Outbreak Timeline Approximate Start Date/Period: First public sightings and upload…

  • c-vir

    Ransomware Intelligence Sheet – “.c-vir” Variant (Last updated: 28 May 2024) Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: Every encrypted file receives the suffix “.c-vir” in lowercase (e.g., document.xlsx.c-vir, backup_01.sql.c-vir). Renaming convention: • Files are moved to the same original directory. • No prepended victim-ID, email string, or random 8-byte trailer –…

  • byya

    Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File-Extension: Every file encrypted by this current Djvu/Stop variant receives “.byya” appended to its original file extension (e.g., picture.jpg → picture.jpg.byya). Renaming Convention: The ransomware only adds the additional extension, never replaces the original portion; filenames themselves stay untouched. 2. Detection & Outbreak Timeline Approximate…

  • byee

    Cyber-Security Guide – Ransomware variant “.byee” Comprehensive technical deep-dive & recovery instructions for defenders 1. Technical Breakdown 1.1 File Extension & Renaming Patterns Known file extension added: .byee Renaming convention: OriginalName.Ext → OriginalName.Ext.id-<8–10-CHAR-ID>.[<attacker-email>].byee Example: Document.docx → Document.docx.id-A5B1C4D3E.[[email protected]].byee 1.2 Detection & Outbreak Timeline First samples collected: January 2024 (dark-web “lockd” affiliate campaign). Major spike in detections:…

  • bydes

    BYDES Ransomware – Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: BYDES appends .bydes to every file it encrypts. Example: report_Q1.pdf → report_Q1.pdf.bydes Renaming Convention: Files retain the original name (including any embedded spaces or hyphens) without changing the preceding extension. Folders remain untouched; a generic ransom note (HOW_TO_RESTORE_FILES.txt) is dropped…

  • bxtyunh

    Technical Breakdown: bxtyunh 1. File Extension & Renaming Patterns Confirmation of File Extension: .bxtyunh Renaming Convention: Every file encrypted by bxtyunh is given the new suffix .<original-filename>.bxtyunh without generating a randomized prefix or renaming the original portion of the filename. Example: Quarterly_Report.xlsx → Quarterly_Report.xlsx.bxtyunh 2. Detection & Outbreak Timeline Approximate Start Date/Period: Earliest string sightings…

  • bwall

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The bWall ransomware appends .bwall to every encrypted file. Renaming Convention: Original → [original_name][random 5–7 hexadecimal chars].bwall Example: QuarterlyBudget.xlsx becomes QuarterlyBudget.xlsx_a4f5c7b.bwall Pro-tip: an identical random suffix is reused for every file on the same host, which can serve as a quick confirmation of…

  • bvjznsjlo

    Below is a community-ready reference for the ransomware family that appends the extension “.bvjznsjlo”. Use it as both a first-response checklist and a deeper technical appendix. Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: .bvjznsjlo (always in lower case, no separating dot in the malware’s own ransom notes, but Windows will show it…