Search Results

  • egmwv

    Ransomware Resource Sheet Variant tracked by extension: .egmwv Technical Breakdown 1. File Extension & Renaming Patterns Extension added: .egmwv (always lower-case, 5 letters). Renaming convention: – Original file photo.jpg becomes photo.jpg.egmwv – No e-mail, ID string, or ransom-code is inserted between the original name and the new extension. – Files in network shares follow the…

  • egh9e

    Community Threat Brief – Ransomware using the extension “.egh9e” Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: .egh9e (always lower-case; no space or second extension is appended). Renaming convention: – Original file Invoice_Oct.xlsx becomes Invoice_Oct.xlsx.egh9e – Directory names are NOT changed, but every file inside is renamed. – NTFS alternate data streams are…

  • egglocker

    Technical Breakdown File Extension & Renaming Patterns • Confirmation of File Extension: The malware literally uses the string “.egglocker” as its final-overwrite extension. • Renaming Convention: Original name −−→ Filename.org.jpg.egglocker (double extension abuse to hide behind an apparent “JPEG”). If a file already has >1 dot, the last component is swapped out: Spreadsheet.xlsx becomes Spreadsheet.xlsx.egglocker.…

  • egg

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: .egg (lower-case) – appended to every encrypted file. Renaming Convention: The ransomware keeps the original filename, adds a 7-byte hexadecimal ID stub, and places the new extension at the end. – Example: Annual_Report.docx → Annual_Report.docx.1f7a3c2.egg – Sameness rule: If the folder already contains…

  • egfg

    Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: “.egfg” (lower-case) is appended to every encrypted file Typical rename pattern: original-name.ext.id-<8-hex-chars>.[[email protected]].egfg (The e-mail address in brackets can change between campaigns – earlier waves used “[email protected]”, “[email protected]”, “[email protected]”, etc.) 2. Detection & Outbreak Timeline First public sightings: 25 Aug 2021 (uploads to ID-Ransomware & VirusTotal)…

  • eg83

    Ransomware Resource Sheet – “.eg83” Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .eg83 Renaming Convention: Files are overwritten in-place and only the new extension “.eg83” is appended (no e-mail, no victim-id, no brackets). Example: Project.docx → Project.docx.eg83 This minimal renaming is characteristic of the Globe-Imposter 2.0 family tree—attackers rely on…

  • eg

    Ransomware Resource Sheet – “EG” Variant Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: All encrypted files receive the secondary extension .eg (e.g., Budget_2024.xlsx → Budget_2024.xlsx.eg). Renaming Convention: Original file name is kept intact; only the extra .eg is appended (no e-mail address, random ID, or BASE-64 string). In most samples…

  • efvc

    efvc Ransomware – Technical Intelligence & Clean-Up Guide Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .efvc Renaming Convention: Encrypts and APPENDS “.efvc” to every affected file. Keeps the original file- and directory names so that: Before: Spreadsheet.xlsx After: Spreadsheet.xlsx.efvc Creates a per-folder copy of the ransom note titled _readme.txt. 2.…

  • efji

    THREAT INTEL BRIEF – Ransomware Family: “EFJI” (Files encrypted / renamed with the final extension “.efji”) TECHNICAL BREAKDOWN 1. File Extension & Renaming Patterns Confirmed extension: .efji (always lower-case, appended LAST) Typical renaming convention: OriginalFileName.ext → OriginalFileName.ext.efji The malware keeps the original file name and simply adds the new suffix. Large files (>150 MB) are…

  • efdc

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: efdc Renaming Convention: Target files keep their original base name, but the ransomware appends “.efdc” as a second extension (e.g., “report.xlsx” becomes “report.xlsx.efdc”). In some cases a victim-specific hexadecimal ID (ex. “[7A8E9C12]”) is pre-pended to the name, so the final result may look…