Search Results

  • blacksun

    Technical Breakdown: BlackSun Ransomware ({{ $json.extension }}) 1. File Extension & Renaming Patterns Confirmation of File Extension: “.blacksun” – Every encrypted file on the host receives this single, fixed extension appended after the original extension (e.g., Contract.docx.blacksun). Renaming Convention: Name case is always lower-case and without additional dots or UUIDs. Folder-level marker file BlackSun_README.txt (or…

  • blacksuit

    Technical Breakdown: BlackSuit Ransomware 1. File Extension & Renaming Patterns Confirmation of File Extension: Encrypted files receive the suffix .blacksuit (lower-case). Renaming Convention: – Original: Annual_Report.xlsx – After encryption: Annual_Report.xlsx.blacksuit – Same pattern for folders: a plaintext ransom note (README_TO_RESTORE_FILES.txt or RECOVER-blacksuit.txt) is dropped into every affected directory. – Certain new BlackSuit droppers also prepend…

  • blackstore

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: blackstore Renaming Convention: Affected files are renamed using the pattern: [original_filename]_[8-hex-char victim ID]_[4-to-8-char campaign ID].[original extension].blackstore Example: Q3_Sales.xlsx_F42E19AB_X31S.xlsx.blackstore 2. Detection & Outbreak Timeline First Public Detection: April-28-2024 (submitted to ANY.RUN, 16:17 UTC). Wider Campaign Activity: May-2024 onward; multiple spikes observed during the first…

  • blackshadow

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Files processed by “BlackShadow” are given the exact uppercase (or occasionally lower-case) extension “.ks8”. Renaming Convention: Every encrypted file is renamed using the template original_name.{7 random hexadecimal char}.ks8. Example: Quarterly-Budget.xlsx → Quarterly-Budget.xlsx.3aFxC2B.ks8. The 7-digit marker is unique per victim and does not contain…

  • blacksh

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Files encrypted by BlackSh are appended with the extension .blacksh. Renaming Convention: Each affected file is renamed following the pattern: <original_name>.<original_extension>.blacksh Example: QuarterlyReport.docx → QuarterlyReport.docx.blacksh Directories containing encrypted files also receive a file named README_BLACKSH.txt that holds identical ransom instructions. 2. Detection &…

  • blackruby

    BLACKRUBY Comprehensive Response Guide Target Ransomware Variant: .BlackRuby Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Every encrypted file is suffixed with “.BlackRuby” in lower-case (e.g., Invoice.xlsx.BlackRuby). Renaming Convention: The ransomware overwrites the original filename with: [Original-Filename without extension][dot]BlackRuby. NO e-mail address, ransom-id, or random string is appended, making the pattern…

  • blackrouter

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The malware is not identified by a custom final extension. Instead it simply appends “.BlackRouter” (note the asterisk is part of the literal ending, not a wildcard) to the original file name*. Examples: Quarterly_Report.xlsx.BlackRouter*, Invoice_123.pdf.BlackRouter*. Renaming Convention: No further prefix, no random hex…

  • blackrock

    Technical Breakdown: ransomware that appends “.BlackRock” 1. File Extension & Renaming Patterns Confirmation of File Extension: .BlackRock – all lower-case except for the capital “B” and “R”. Renaming Convention: Each encrypted file receives the original name followed by a random 32-48 character hexadecimal identifier (an 8-byte machine ID + 24-40 byte AES-CBC IV), then the…

  • blackransombdbot

    Technical Breakdown: BlackRansomBot / “blackransombdbot” 1. File Extension & Renaming Patterns Confirmation of File Extension: ▸ .blackransombdbot – appended once to the end of every encrypted file (e.g., Report.xlsx → Report.xlsx.blackransombdbot) Renaming Convention: ▸ Append-only – the ransomware does NOT change the original name, it only adds the exact literal .blackransombdbot after the last legitimate…

  • blackpink

    blackpink ransomware: a concise but actionable threat sheet Technical Breakdown File Extension & Renaming Patterns • Confirmation of File Extension: .blackpink (always lowercase, preceded by the original file name). • Renaming Convention: original_name.ext → original_name.ext.blackpink (no random characters or hex strings are injected). After encryption the wallpaper is auto-replaced with blackpink_wallpaper.jpg. Detection & Outbreak Timeline…