The ever evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files located in multiple locations including local and remote drives, removable drives, mapped drives, and un-mapped network shares.
Cerber continues to evolve and is one of the most complex and sophisticated ransomware families to date. The ransomware is sold to distributors on underground Russian forums.
The original version appends the ".sage" extension to encrypted files and demands $150 in bitcoins for the decryption key. An second version, Sage 2.0, demands $2,000. Sage 2.2 was discovered in February 2017 and downloads its main payload to %Temp% folder.
The ransomware is distributed via spam emails and uses a combination of RSA and AES encryption. The ransomware continues to evolve and has also been circulating as a fake Chrome font pack that is distributed via compromised websites.
The ransomware encrypts files using RSA-2048 encryption and display's a fake Explorer.exe application error. The malware is a variant of CryptoMix and currently distributed via the RIG exploit kit.
The ransomware uses exploits leaked by the Shadow Brokers and has infected a large number of computers including those in the government, telecom, and educational sectors. Files are encrypted denoted by the .WNCRYT extension. The bounty for WannaCry ranges from $300 to $600 but payments may not be uniquely associated with a system. The initial variants of WannaCry no longer encrypts if the sample can resolve an external DNS which is held by security researchers.
The ransomware is a variant of Stampado and is programmed in the AutoIT scripting language. The malicious software is distributed via spammed emails containing a fake overdue payment notice and demands 0.3 Bitcoin for the decryption key.
The ransomware threatens to delete files every hour unless the victim pays the ransom. Victims are infected after being tricked into believing they are downloading fraudulent versions of various software. Variants of the malware also report the encrypted files will be sent to your Contacts if the ransom is not paid.
The ransomware pretends to be a shipping notification and claims to destroy the decryption key if the ransom is not paid within 78 hours. The malicious software continues to evolve and redirects victims to a fake Office web page.
The ransomware appends multiple extensions to encrypted files including .jaff and .wlu. The malicious software is distributed via spam email and uses RSA and AES-256 encryption.
Encrypted files are appended with a random 5 character extension and a unique 8 character vicitm ID which are derived from the serial number of the C:\ drive and the MAC address of the first network interface.