Search Results

  • flscrypt

    Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .flscrypt Renaming Convention: Flscrypt (also marketed as “Fluffy-Flscrypt” or “Fluffy-FSC”) appends the literal string .flscrypt directly to the original name of every encrypted object. Example: Annual_Report.xlsx → Annual_Report.xlsx.flscrypt Vacation.jpg → Vacation.jpg.flscrypt No e-mail address, hexadecimal ID, or numeric suffix is added, so every…

  • flowencryption

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The FlowEncryption ransomware concatenates the suffix “.flowencryption” to every file it encrypts (e.g., Budget_2024.xlsx → Budget_2024.xlsx.flowencryption). Renaming Convention: A single pass is performed; no additional prefixes or random hex strings are placed in front of the original filename, so the only visual change…

  • flocked

    Technical Breakdown – “Flocked” (file-marker “+.Flocked”) Last revised: 2024-06-XX File Extension & Renaming Patterns • Confirmation of File Extension: every encrypted file receives the suffix “.Flocked” (case-insensitive on Windows, preserved lower-case on *nix). • Renaming Convention:  – Original: C:\Users\alice\Documents\2024Q2Report.docx  – After: C:\Users\alice\Documents\2024Q2Report.docx.Flocked  The ransomware preserves the full original name + path in a JSON structure…

  • flkr

    Ransomware Profile – “.flkr” Variant (a.k.a. “Floker”, occasionally mis-detected as “WannaFlkr”) Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Every encrypted file is given the .flkr suffix appended to the original extension – e.g. 2024-budget.xlsx.flkr, server-dump.sql.flkr. Renaming Convention: The ransomware retains the original file name and intermediate extension, simply appending .flkr…

  • [email protected]

    Technical Breakdown ([email protected] – GlobeImposter 3.0 family) 1. File Extension & Renaming Patterns Confirmation of File Extension: .000g is the final, lowercase, four-character extension appended to every encrypted file. The full extension string that victims see on-disk is [email protected] (e-mail + ext). Renaming Convention: ‹Original file name›[email protected] Example: 2024-Q1-Budget.xlsx → [email protected] 2. Detection & Outbreak…

  • flatcher3

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: .flatcher3 Renaming Convention: Appends “.flacher3” to every encrypted file (e.g., Quarterly_Report.xlsx → Quarterly_Report.xlsx.flatcher3). Inside each folder a plain-text ransom note named HOW_TO_RETURN_FILES.txt is dropped; no desktop wallpaper change or registry-based note has been observed. 2. Detection & Outbreak Timeline Approximate Start Date/Period: First…

  • flat

    Flat Ransomware – Community Threat Dossier Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .flat (case-insensitive; appended after the original extension – e.g. Annual_Report.xlsx.flat) Renaming Convention: Does not change the base file name. Adds exactly one new extension: .flat (no secondary tag, no e-mail or ransom code). NTFS Alternate Data Streams…

  • flash*

    Community Brief: Ransomware using the extension pattern “flash*” The information below is compiled from publicly-available incident reports, sandbox analyses, vendor advisories, and CERT/CC notifications. Because “flash*” is a wildcard that has been used by several minor campaigns (rather than one big-brand family such as Ryuk or LockBit), treat the timeline and technical specifics as a…

  • flamingo

    Flamingo Ransomware – Community Defense & Recovery Guide (Last updated: 20-March-2024) Technical Breakdown 1. File Extension & Renaming Patterns Exact extension added: .flamingo (lower-case, no space or bracket) Renaming convention: Original: Project_Q1.xlsx After encryption: Project_Q1.xlsx.flamingo Deep-path handling: keeps Unicode and long paths; does NOT drop base-name or append e-mail/ID strings → this cosmetics differs from…

  • fj7qvar9vumi

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: The ransomware appends the fixed-length, pseudo-random string fj7qvar9vumi as a second extension to every encrypted file (e.g. invoice.pdf.fj7qvar9vumi, database.mdf.fj7qvar9vumi). Renaming Convention: The original base file name and first extension are preserved exactly. No e-mail address, victim-ID, or hexadecimal counter is injected into the…