Search Results

  • extension.srpx

    Technical Breakdown (Srvpx / SRPX Ransomware) 1. File Extension & Renaming Patterns Confirmation of File Extension: Every encrypted file is appended with “.srpx” (lower-case only). Example: Annual_Report.xlsx → Annual_Report.xlsx.srpx No additional payload suffixes – the “.srpx” is added directly to the original filename (no e-mail address, no victim-ID, no random hex). 2. Detection & Outbreak…

  • exte

    ext-e Ransomware Intelligence Brief (extension string observed in-the-wild: “.EXT-E”) Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: “.EXT-E” (upper-case; a hyphen, not an underscore) Renaming Convention: – Original name: Quarterly-Report.xlsx – After encryption: Quarterly-Report.xlsx.EXT-E – Folder-level marker: every encrypted directory receives “HOWTORECOVER.EXT-E.txt” (sometimes “.hta” on Windows) 2. Detection & Outbreak Timeline…

  • exqed

    Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: .exqed Complete pattern used in the wild: <original-file-name>.<original-extensión>.id-<12-to-18-digit-VICTIM-ID>.[‹TELL-ME-YOUR-ID›@TUTA.IO].exqed Example: Budget2019.xlsx → Budget2019.xlsx.id-A12B34C56D78E910.[[email protected]].exqed The “VICTIM-ID” and the contact address vary per affiliate; some samples append [(random-number)].exqed instead. The malware writes an identical-length, high-entropy 32-byte block to every encrypted file header, making magic-byte carving impossible without the…

  • explorer

    explorer (Unknown / Place-Holder) Technical Breakdown & Recovery Playbook Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension observed: “.explorer” (all lower-case, no space). Renaming convention (cluster of uploads to ID-Ransomware, Any.Run, MalwareHunterTeam, Oct-2022): <original file name>.<original extension>.id-<8-hex-chars>.[attacker-email].explorer Example: Project_Q3.xlsx → Project_Q3.xlsx.id-4A2F9C71.[[email protected]].explorer 2. Detection & Outbreak Timeline First public submission: 07-Oct-2022 (KR). Peak distribution…

  • exploit6

    Ransomware Briefing – exploit6 (.exploit6) Last revised: 2024-05-10 Technical Breakdown 1. File Extension & Renaming Patterns Confirmed suffix appended: .exploit6 (lower-case, no secondary extension) Renaming convention: Original file → <original_name>.EXX_<random-6-digits>.exploit6 Example: 2024-Q1-Reports.xlsx becomes 2024-Q1-Reports.xlsx.EXX_472918.exploit6 All directory names are left untouched; only file objects are renamed. 2. Detection & Outbreak Timeline First public submission to any.run:…

  • exploit

    Ransomware Focus: Files Marked with the Extension .exploit Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: .<8-hex-chars>.exploit (example.doc → example.A4F7C01B.exploit) Renaming Convention: The malware keeps the original basename, appends a new random-looking 8-character hex string, then the fixed second extension “.exploit”. Directory names themselves are NOT touched, so encrypted files are…

  • expboot!

    Ransomware Resource Sheet for: expboot! Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: The malware appends the suffix “.expboot” (no dot delimiter) directly to the original file name; e.g. Quarterly_Report.xlsx becomes Quarterly_Report.xlsx.expboot. Renaming Convention: – No fixed “base-name” rewriting – the original file name is left intact. – In some samples…

  • expboot

    Ransomware Brief: “.expboot” Technical Breakdown 1. File Extension & Renating Patterns Confirmation of file extension: Every encrypted file receives the suffix .expboot Renaming convention: Original file invoice.xlsx → invoice.xlsx.expboot. No e-mail, victim-ID, or random string is inserted; the malware simply appends the extension after the existing one. 2. Detection & Outbreak Timeline First publicly-visible submissions…

  • exotic

    EXOTIC Ransomware – Community Resource Sheet (Last updated: March 2024) TECHNICAL BREAKDOWN 1. File Extension & Renaming Patterns Extension added: .exotic (lower-case, always preceded by the original extension → invoice.pdf.exotic) Secondary marker: No change to the base file name – the malware simply stacks its token after the true extension. Dropped files: – HOW-TO-RECOVER-FILES.txt (campaign…

  • exolocked

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Files encrypted by the Exolocked ransomware are re-appended with the extension .exolocked (all lower-case, no trailing dot or number). Renaming Convention: Victim files retain their original basename and any pre-existing extension, then receive a single concatenated suffix: <original_filename>.<original_ext>.exolocked Examples: Quarterly_Report.xlsx.exolocked Vacation.jpg.exolocked A plain-text…