Search Results

  • evopro

    Evopro Ransomware Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: – The malware appends the literal string “.evopro” (lower-case) to every file it encrypts. – Example: Quarterly-Report.xlsx → Quarterly-Report.xlsx.evopro Renaming Convention: – It leaves the original file name and original extension intact, then adds the extension suffix (no random bytes, no…

  • evolution

    Ransomware deep-dive: the “.evolution” (Evolution) strain Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: .evolution (lower case, no second-level suffix). Renaming convention: original_name.ext.[victim_id].[attacker_email].evolution Example: Budget2024.xlsx → [email protected] The 8-byte victim ID is generated from the system’s MAC address + XOR key; the e-mail address varies by affiliate campaign ([email protected], [email protected], etc.). 2. Detection…

  • evillock

    Evillock Ransomware Resource Extension observed in the wild: .evillock Technical Breakdown File Extension & Renaming Patterns • Confirmation of File Extension: .evillock – Appended AFTER the original extension, e.g. Annualreport.xlsx → Annualreport.xlsx.evillock • Renaming Convention: – No prefix or e-mail address is prepended (keeps original file name intact). – Each folder receives a deterministic “key.bin”…

  • evil

    Ransomware Profile: “EVIL” (Extension: .evil) Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: .evil Renaming convention: File-plant.txt → File-plant.txt.evil Folders receive a plain text marker “READMETORESTORE.evil” (same name, no random string). No email or victim-ID prefix/suffix is added; the only change is the single “.evil” suffix appended to every encrypted object (files, thumbnails,…

  • everest

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The Everest ransomware family appends the fixed suffix .EVEREST to every encrypted file (e.g., Budget_2024.xlsx → Budget_2024.xlsx.EVEREST). Renaming Convention: Original name is preserved; only the single extension is added. No e-mail address, victim ID, or random hex-string is inserted, making quick visual triage…

  • everbe*

    Everbe Ransomware Family (.everbe, .thunder, .embrace, .pain, .volcano, etc.) Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extensions ever observed in the Everbe隊列: – .[[email protected]].everbe – .thunder – .embrace – .pain – .volcano – .[[email protected]].twist – .light – .babyk – .quiet Typical renaming convention: Original: Quarter-Q2.xlsx After encryption: Quarter-Q2.xlsx.[<unique-id>][<contact-e-mail>].<chosen-extension> Example: Quarter-Q2.xlsx.[B4DA0BEF][[email protected]].everbe The malware keeps…

  • everbe

    Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .everbe, .everbe 2.0, or (in later campaigns) .[[email protected]].everbe. Renaming Convention: Victim files are renamed in one of two ways, depending on the campaign: Original name is kept but the extension is simply replaced with .everbe Example: Quarterly-Report.xlsx → Quarterly-Report.everbe Address-tagged variant adds the…

  • ever101

    Ransomware Resource Sheet – “EVER101” (.ever101 extension) TECHNICAL BREAKDOWN 1. File Extension & Renaming Patterns Confirmed extension: .ever101 (lowercase, no space). Renaming convention: original_name.ext.id-XXXXXXXX.[contact-email].ever101 – XXXXXXXX = 8-character victim ID generated from system hash – contact-email varies by campaign (historically [email protected], [email protected], [email protected]) – Example: Project.docx → [email protected] 2. Detection & Outbreak Timeline First public…

  • ev3rbe

    Ransomware Dossier – “EV3RBE” (ev3rbe) TECHNICAL BREAKDOWN 1. File Extension & Renaming Patterns Confirmed extension: .ev3rbe (lower-case) Renaming convention: [original_name][original_extension].ev3rbe Example: Annual-Report.xlsx becomes Annual-Report.xlsx.ev3rbe The ransomware intentionally omits system-critical paths (Recycle-Bin, Boot, etc.) to keep the OS bootable while maximising user pain. 2. Detection & Outbreak Timeline First cluster sighted: 19 March 2024 (Europe MSP…

  • ev

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The “.ev” extension is appended to every encrypted file (e.g., Budget.xlsx → Budget.xlsx.ev). Files keep their original names; nothing is prepended or overwritten—only the single three-character suffix is added. Renaming Convention: Original.Full.Name.ext → Original.Full.Name.ext.ev (no email address, ransom-ID, or random bytes in the…