Search Results

  • cry36

    Technical Breakdown: Cry36 Ransomware (ran by the BTCWare family) File Extension & Renaming Patterns • Confirmation of File Extension: ‑.cry36 • Renaming Convention: Original name  ➜  [filename].[original-ext].id-[victim-machine-id].[attacker-mail1&2].cry36 (typical example: Invoices.xlsx → Invoices.xlsx.id-A1B2C3D4.[[email protected]].cry36) Detection & Outbreak Timeline • First publicly surfaced: March 2017 as a new variant of the BTCWare family. • Peak activity waves: April–August…

  • cry128

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: Files encrypted by Cry128 (categorized under the CrySiS / Dharma family) receive the appended extension “.cry128”. Renaming Convention: Example – 2024-05-15-Invoice.pdf ⇒ 2024-05-15-Invoice.pdf.id-XXXXXXXX.[[email protected]].cry128 Variant 1: [EMAIL_EXT].cry128 (two parts after the original file name). Variant 2: Some samples insert a victim-UID in square brackets:…

  • cry

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: All files encrypted by this strain carry the suffix .cry (all lower-case, three characters) appended directly after the original filename and extension. > Example: Annual\Report\2024.xlsx → Annual\Report\2024.xlsx.cry Renaming Convention: The ransomware does NOT inject random characters or email addresses, but it also drops…

  • crxx

    Ransomware Profile: crxx Community-first incident guide – v1.1 (kept concise but actionable) Technical Breakdown 1. File Extension & Renaming Patterns Confirmed extension: .crxx Renaming convention: Original files receive a double extension: originalname.ext.id-<UUID>[email protected] The UUID is 8-4-4-12 chars. In infections observed so far, the attacker e-mail placeholder is [email protected], [email protected], or [email protected]. 2. Detection & Outbreak…

  • cruel

    Technical Breakdown (Cruel Ransomware): 1. File Extension & Renaming Patterns Confirmation of File Extension: “.cruel” (a 5-character lower-case suffix that is surgically appended to the original filename). Renaming Convention: Original filename → <original_name>.<ext>.cruel. Example: QuarterlyReport-2024.xlsx becomes QuarterlyReport-2024.xlsx.cruel Hidden or system files receive the same treatment: $Recycle.Bin → $Recycle.Bin.cruel 2. Detection & Outbreak Timeline Approximate Start…

  • crrrt

    Technical Briefing: Stopping & Recovering from CRRRT Ransomware (.crrrt) Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .crrrt (always lowercase, never .CRRRT). Renaming Convention: Files keep their original sub-path but are force-renamed as OriginalName.ext.ID-[random 6–8 chars].crrrt Example: Budget2024.xlsx becomes Budget2024.xlsx.ID-9A2F5E3C.crrrt Folders themselves are untouched; only internal files encrypted. 2. Detection &…

  • crptxxx

    Technical Breakdown – crptxxx Ransomware 1. File Extension & Renaming Patterns Exact File Extension: .crptxxx (LOWER-CASE “crptxxx”; often no dot separator inside the filename itself, i.e., document.pdf.crptxxx). Typical Renaming Convention: Keeps the original file name and original extension. Appends .crptxxx directly at the tail (<original name>.<original ext>.crptxxx). Sub-folders in each affected directory receive a copy…

  • crptrgr

    Technical Breakdown: 1. File Extension & Renaming Patterns Confirmation of File Extension: In infections labeled by incident responders as “.crptrgr”, every encrypted file receives the suffix “.crptrgr” immediately after the original extension. Renaming Convention: Original: Project_Schedule.xlsx → Encrypted: Project_Schedule.xlsx.crptrgr Multiple extensions are retained: Backup_v2.pdf.tar.gz becomes Backup_v2.pdf.tar.gz.crptrgr 2. Detection & Outbreak Timeline Approximate Start Date/Period: Sporadic…

  • crptd

    CRPTD Ransomware – Community Defense Guide Target file extension: .crptd Technical Breakdown 1. File Extension & Renaming Patterns Exact file marker: .<8-rand_letters>.crptd Examples: 2024_contract.<jhxqzpml>.crptd, family_budget.xlsx.<hnvbyxkc>.crptd Renaming convention: original_filename.ext.<8-random-lowercase-letters>.crptd The random 8–character token is appended to hinder duplicate detection tools. 2. Detection & Outbreak Timeline First observed: March 2024 (mid-month malware-dump feeds) Peak activity: April–July 2024;…

  • crp

    Ransomware Focus Sheet – “.crp” Variant Authored by the CyberSec Incident-Response Collective Last updated: 2024-06-07 Technical Breakdown: 1. File Extension & Renaming Patterns Extension: All encrypted files receive the suffix .crp immediately after the original filename and before any existing extension. Example: 2024_Q1_Report.xlsx → 2024_Q1_Report.xlsx.crp Renaming Convention: The ransomware does not prepend or infix random…