You can check the latest ransomware information.
[ MarraCrypt ransomware ]
[Virus/Malware Activity Report: MarraCrypt Ransomware]
A security breach believed to be in the form of MarraCrypt ransomware has occurred,
so we would like to confirm the situation and provide a warning as follows.
MarraCrypt Ransomware
The ransomware is called MRAC and appears to be changing all files with the extension [newpatek@cock.li].MARRA. MRAC ransomware stops services or forcibly terminates processes in order to infect data in key processes.
How it works
file version
[Figure 1 File version]
[Figure 2 File properties]
behavioral process
Create sys.bat command file / Delete shadow copies / Delete backup-related data
Ransomware creates sys.bat in the rootUsersPublic location and executes commands to delete shadow copies and backup data.
[Figure 3 File creation]
[Image 4 Deleting shadowoop copies]
Create onmywrist.bat command file / Delete original ransomware
After completing the encryption process, create the onmywrist.bat file and run the command to delete the original.
[Figure 5 Command file creation]
[Figure 6 Execution command]
Infection results
An information file is created under the name MARRACRYPT_INFORMATION.HTML in each folder, and a MARRACRYPT_ID_DO_NOT_TOUCH file encrypting the encrypted key value is created in a specific location. When encryption is performed, <encryption file name. The files are changed to [newpatek@cock.li].MARRA>.
[Figure 7 Infection result 1]
[Figure 8 Infection result 2]
[Figure 9 Infection result 3]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
[Figure 10 Block message]
[Figure 11 Blocking details]