Search Results

  • alka

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The ransomware uses “.alka” (lower-case) appended to the original name of every file it encrypts. Renaming Convention: Files are renamed in three predictable segments: [original_name].[original_extension].[EMAIL].[random-hex-ID].alka Example: Budget2024.xlsx.id-A1B2C3D4.[[email protected]].alka The inserted e-mail (e.g., [email protected], [email protected]) changes from campaign to campaign but the overall pattern is…

  • alix1011rva

    Technical Breakdown: ALIX1011RVA Ransomware 1. File Extension & Renaming Patterns Confirmation of File Extension: ALIX1011RVA uses the compound extension .alix1011rva only after appending a victim-specific ID. Example: Document.docx.{C305F1DB-88F5-78C9-F6C6-6C548C29A605}.alix1011rva Renaming Convention: • In-order, deterministic: original name ➜ dot-hash victim-ID ➜ final extension. • Victim-ID format: {8-4-4-4-12} Guid wrapped in curly braces → uppercase hex only. •…

  • alilibat

    Technical Breakdown: File Extension & Renaming Patterns • Confirmation of File Extension: “.alilibat” (exact, lower-case 8-letter suffix appended after the original extension). • Renaming Convention: [original-name]_[8_random_lowercase_hex]_[timestamp-epoch].alilibat Example: Annual_Report_2024.xlsx -> Annual_Report_2024.xlsx_4fa92b0d_1718543801.alilibat Detection & Outbreak Timeline • First telemetry reported: 2024-05-20 (multiple submissions to VirusTotal + ransom notes found on BleepingComputer forum). • Rapid expansion observed after…

  • alienlock

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: alienlock Renaming Convention: AlienLock follows a simple single-suffix pattern: <original_name>.<original_ext>.alienlock Example: QuarterlyReport.xlsx becomes QuarterlyReport.xlsx.alienlock. The ransomware does not inject its own identifier string between the final dot and the appended suffix, nor does it swap the original extension. However, it omits the .alienlock…

  • alien

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: “.alien” Renaming Convention: After encryption, the malware first strips the original filename, adds a 6-byte random uppercase ASCII string plus a hyphen, appends the victim’s ID (32 hex-characters), and finally tacks on “.alien”. Example: IMG_1234.jpg → RXJZZW-A8B3F860D4C7E8B1F3A0E6D2A4C9F0BE.alien 2. Detection & Outbreak Timeline Approximate…

  • alice

    RAL – Ransomware-identified by the extension “.alice” (ALPHV/BlackCat variant) Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of Extension: Encrypted files are appended with “.alice” in lower-case (e.g., spreadsheet.xlsx.alice). Renaming Convention: Alphanumerically renames files first (to prevent immediate recognition). Drives/volumes are infected symmetrically, so mapped network shares receive the same .alice tag almost simultaneously.…

  • alfablock

    ALFABLOCK Ransomware – Technical & Tactical Resource Technical Breakdown File Extension & Renaming Patterns • Confirmation of File Extension .alfablock – appended after the original file extension, not in place of it (e.g., 2023-Q4-Budget.xlsx.alfablock). • Note: Some v1.1 samples have also been seen leaving a secondary zero-byte file with .alfablock.ReadMe! for every encrypted document. These…

  • alfa

    Technical Breakdown: ALFA Ransomware (.bin, .block, or .AlfaFile) ⚠️ Note: this family is sometimes advertised as “AlfaFileSystem,” but most victims only see one of the above extensions. 1. File Extension & Renaming Patterns Exact extension printed to the ransom note (README-IMPORTANT.txt / READ ME NOW.htm): .bin (the most widespread) Older spin-offs also tack on .block…

  • aleta

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: aleta Renaming Convention: After encryption, every file receives a compound extension that records four pieces of data: A ten-character hexadecimal value (random, generated device ID) The e-mail address of the threat-actor (changes per campaign, e.g., [email protected]). The literal string “aleta” A secondary long…

  • alcatraz

    Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Files encrypted by Alcatraz ransomware receive the exact six-character extension .alcatraz appended after the original extension. Renaming Convention: The original file and path are left unchanged except for the extension concatenation. Example: Quarterly_Report_Q2.xlsx.alcatraz 2. Detection & Outbreak Timeline Approximate Start Date/Period: First spotted…