Search Results

  • accdfisa

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: .accdfisa Example: Invoice_2024.pdf.accdfisa Renaming Convention: The ransomware simply appends the extension .accdfisa to every affected file, preserving the original filename and any pre-existing extensions. It uses a single static suffix; there is no embedded attacker ID, hash, or incremental numbering. 2. Detection &…

  • acc

    Technical Breakdown (ACC Ransomware) 1. File Extension & Renaming Patterns Confirmation of File Extension: The ACC ransomware variant appends .acc (all lower-case, three letters, no hyphen or dot separator in the final renaming phase). Renaming Convention: <original_name><original_extension>.acc Example: Quarterly_Financial.xlsx → Quarterly_Financial.xlsx.acc After system-wide enumeration, ACC also drops a postfix-length marker hash (_r{6-8}[a-zA-Z0-9]) on the Volume…

  • abyss

    CYBER-SECURITY ALERT 2024-06-XX Document Version: 1.0 Threat Name: ABYSS Ransomware Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .abyss Renaming Convention: Original photo.jpg → photo.jpg.abyss The ransomware adds the extension directly to the existing file name without changing the original basename or inserting a victim-ID token. This clean append pattern makes…

  • abstergo

    Abstergo Ransomware: Technical Breakdown & Recovery Guide Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Abstergo appends the extension .abstergo (lower-case, no fourth-level separator) to every encrypted file. Example: Annual_Report_2024.docx → Annual_Report_2024.docx.abstergo Renaming Convention: Files themselves are not renamed; only an additional “.abstergo” suffix is added. (The actor’s dropper internally records…

  • abram

    Ransomware Profile: .abram Technical Breakdown 1. File Extension & Renaming Patterns Exact Extension: .abram Renaming Convention: Each encrypted file is simply appended with an additional extension (e.g., document.docx → document.docx.abram). The malware does not prepend random strings, alter alphabetic casing, or modify the original filename core—this makes it easier to spot and revert (after decryption)…

  • aboutyourfiles.*

    Ransomware Deep-Dive Report Family nick-named aboutyourfiles Technical Breakdown 1. File Extension & Renaming Patterns Confirmed Extension: Files that have fallen victim to the payload are appended with a double extension “.aboutyourfiles” (lower-case, kept literally—no wildcards, no additional dots, no date stamp). e.g. Q3-Finance.xlsx.aboutyourfiles, SERVER-SHARE_BACKUP.tar.gz.aboutyourfiles Renaming Convention: The malware does not shift filenames into new directories…

  • about_files.txt

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Files encrypted by this family keep their original file extension in every case tested to date; the only tell-tale sign inside every directory is a small text file named about_files.txt – hence the variant name used by the community. Renaming Convention: No bulk…

  • abkir

    abkir Ransomware Analysis & Recovery Guide (Last revised: June 27 2024, v1.2) Technical Breakdown 1. File Extension & Renaming Patterns Confirmed File Extension: .abkir Every encrypted file will have exactly this extension appended after the original one, ignoring prior dots or renaming. e.g. Invoice_2024Q2.xlsx → Invoice_2024Q2.xlsx.abkir Report.pdf → Report.pdf.abkir Renaming Convention: • No partial file-name…

  • abiyq

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Victims will see .abiyq appended as a secondary extension after the original file extension (e.g., Budget2024.xlsx.abiyq, Family.jpg.abiyq, db_backup.mdf.abiyq). Renaming Convention: The ransomware does not use a prefix token or a victim ID in the filename itself; only the double-extension pattern is employed, making…

  • abclocker

    Target Ransomware Family: abclocker (a.k.a. ABC-Locker) Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: The ransomware appends the fixed 9-character extension .abclocker to every encrypted file. Example: Q4-Budget.xlsx becomes Q4-Budget.xlsx.abclocker Renaming Convention: No further sub-extension or e-mail addresses are injected—the only change is the simple append of .abclocker. The path depth…