Ransomware Report

You can check the latest ransomware information.

title
Devos ransomware, a ransomware that infects ransomware using the email attachment macro function
Registration date
2023-01-03
views
14121

[ Devos ransomware ]

[Virus/Malware Activity Report: Devos Ransomware]

Due to a breach believed to be in the form of Devos ransomware,
we would like to confirm the situation and provide a warning as follows.

Devos ransomware

The ransomware is called Devos and appears to be changing all files with the extension filename.extension.id[private key].[henderson@cock.li].Devos.

How it works

file version


[Figure 1 File version]


[Figure 2 File properties]

behavioral process

  • - Execute automatic privilege elevation command

    Register privilege elevation command using AutoElevation vulnerability


    [Figure 3 - Executing automatic privilege elevation command]

  • Register startup program

    Registers itself in the startup program to automatically re-run when Windows starts.


    [Figure 4 Startup program registration]

  • Turn off firewall

    Disable firewall settings to make your PC less secure.


    [Figure 5 Disable firewall]

  • Deleting shadow copies

    Deletes shadow copies to make recovery difficult after infection.

Infection results

Information files are created in each folder with the names info.txt / info.hta, and when encryption is performed, the files are changed to <file name.extension.id[private key].[ henderson@cock.li].Devos> It's possible.


[Figure 6 Infection result 1]


[Figure 7 Infection result 2]


[Figure 8 Infection result 3]

White Defender compatible

It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.


[Figure 9 Block message]


[Figure 10 Block message]

Watch Devos blocking video

Everyzone White Defender Co., Ltd. | CEO: Seunggyun Hong|Business registration number: 220-81-67981
Copyright ⓒEveryzone , Inc. All Rights Reserved.|