You can check the latest ransomware information.
[DVN ransomware]
[Virus/Malware Activity Report: DVN Ransomware]
Due to a breach believed to be in the form of DVN ransomware,
we would like to confirm the situation and provide a warning as follows.
DVN ransomware
The ransomware is called DVN and appears to be changing all files with the existing name and extension.devinn.
How it works
file version
[Figure 1 File version]
[Figure 2 File properties]
behavioral process
Inside basic information
Through the information in the internal variables, it can be inferred that it operates in association with the name svchost.exe or that any image file can be saved as a Base64 value.
[Figure 3 Internal basic information]
Change ransomware execution location and name
Ransomware that has been executed once copies itself to the AppDataRoaming location and re-executes it with administrator privileges under the name svchost.exe.
[Figure 4 Ransomware execution location]
[Figure 5 Name change]
Register startup program
Create a link file with the location of the executed ransomware and place it in the startup program.
[Figure 6 Startup program registration]
Select attack target
Basically, it attacks drivers other than the C drive first, and then attacks user libraries and shared folders.
[Figure 7 Selection of attack target]
[Figure 8 Selection of attack target 2]
encryption method
What is unique is that various encryption functions such as bytes/String/AES/RSA/Base64 are used depending on the file size.
[Figure 9 Encryption method]
[Figure 10 Specific extension where encryption is performed]
[Figure 11 Contents of infection txt stored internally]
Command to disable backup means
In general, it includes deleting shadow copies frequently used by ransomware and disabling functions related to Windows recovery mode, and there is also a command to erase the backup catalog used in Windows Server.
[Figure 12 Command to disable backup means]
Infection results
The guide file unlock_here.txt is created in each path, and when encryption is performed, the files are changed to <existing name.existing extension.devinn> and the desktop is changed upon completion.
[Figure 13 Infection result 1]
[Figure 14 Infection result 2]
[Figure 15 Infection result 3]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
[Figure 16 Block message]
[Figure 17 Block message]