Search Results

  • ezz

    Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .ezz (added to the original filename, e.g. Invoice.xlsx → Invoice.xlsx.ezz) Renaming Convention: Keeps the original name and first extension, then appends .ezz. No e-mail address, ransom-code, or additional marker is inserted between the original name and the new extension. 2. Detection & Outbreak…

  • ezivk

    Ransomware Intelligence Sheet Target Variant: .ezivk Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Encrypted files receive the “.ezivk” suffix appended to their original name (e.g., Budget2024.xlsx → Budget2024.xlsx.ezivk). Renaming Convention: Does NOT overwrite the original extension; the extra six bytes simply sit on the end. No secondary marker file or…

  • ezdz

    ezdz Ransomware – Community Defense & Recovery Guide (Last updated: 12 June 2025) TECHNICAL BREAKDOWN 1. File Extension & Renaming Patterns Confirmed extension used: .ezdz (lower-case, four characters, no space). Renaming convention: [original_name]_[8-hex-chars].ezdz Example: Quarterly_Report.xlsx → Quarterly_Report_A173B9F2.ezdz The 8-byte hex string is the first half of the malware-generated file-ID that is later sent to the…

  • ezbyzzart3xx

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: .ezbyzzart3xx (the trailing “xx” is a hard-coded signature; earlier campaigns used .ezbyzzart, .ezbyzzart2, and .ezbyzzart3). Renaming Convention: – Original file name is preserved, then the criminal ID string, campaign number, and extension are appended: <original_name>.[<victim_ID>]C<xx>.ezbyzzart3xx – Example: Quarterly_Report.pdf.[A1B2C3D4]C05.ezbyzzart3xx – Folders receive a plain-text…

  • eyrv

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Files are appended with the new extension “.eyrv” (lower-case, no space or prefix). Renaming Convention: <original_filename>.<original_extension>.eyrv Example: Quarterly-Report.xlsx → Quarterly-Report.xlsx.eyrv 2. Detection & Outbreak Timeline Approximate Start Date/Period: First-sample submission to public malware repositories: 18 Feb 2024. Surge in telemetry hits observed 20-25…

  • eye

    Ransomware Profile: the “.eye” strain (a.k.a. “JSWorm 4.0 / Nemty / NPMargin” family) TECHNICAL BREAKDOWN 1. File Extension & Renaming Patterns Confirmation of file extension: .eye Renaming convention: – Original name → <original_name>.<originalext>.[victim-ID].[attacker-email].eye Example: AnnualReport.xlsx becomes AnnualReport.xlsx.1E4C6B3E.[[email protected]].eye – The 8-byte victim-ID is random hexadecimal and is also written inside the ransom note so the actor…

  • exx

    Everything we know about the “.EXX” ransomware wave (compiled for SOCs, MSPs, & home responders) TECHNICAL BREAKDOWN 1. File extension & renaming patterns Exact extension appended: .exx (lower-case, three letters, preceded by a dot) Renaming convention: <original file-name>.<original-extension>.id-< Victim-ID >.[<attacker-e-mail>].exx Example: Quarterly-Results.xlsx.id-A12B3C4D.[[[email protected]](mailto:[email protected])].exx 2. Detection & outbreak timeline First submitted to public malware repositories: 08-Jan-2021 (UTC)…

  • extractor

    Ransomware Brief – “Extractor” (a.k.a. .[ extractor ] extension) Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: every encrypted file receives the suffix .extractor (lower-case, no brackets or random IDs). Example: Quarterly-Results.xlsx → Quarterly-Results.xlsx.extractor Renaming Convention: Original name + original extension are kept intact; only the single new suffix is appended…

  • extortion scam

    Ransomware Identifier: .EXTORTION-SCAM (a.k.a. “no-encryption extortionware”) Community Threat Dossier – v1.2 – compiled June 2025 TECHNICAL BREAKDOWN File Extension & Renaming Patterns • Confirmation of file extension: The literal string “.EXTORTION-SCAM” is appended without removing the original extension; e.g. “Annual_Report.xlsx.EXTORTION-SCAM”. • No internal file alteration occurs; the plaintext data remain intact. • In rare copy-cat…

  • extortion

    Ransomware Intelligence Report Family known to the community as: “Extortion” Primary file marker/extension: .extortion Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension appended: .extortion (lower-case) Typical renaming convention: original_name.docx → original_name.docx.extortion The family keeps the original filename intact—only the extra suffix is added. Some clusters have been seen prepending the victim-ID in square…