You can check the latest ransomware information.
[ Seoul ransomware ]
[Virus/Malware Activity Report: Seoul Ransomware]
In response to a security breach believed to be in the form of Seoul ransomware,
we would like to confirm the situation and provide a warning as follows.
Seoul ransomware
The ransomware in question is called Seoul and appears to be changing the final file to a compressed file with the existing name, existing extension, and [unique ID].zip. It was created to attack companies based on the Delphi language and appears to be active recently.
How it works
file version
[Figure 1 File version]
[Figure 2 File properties]
behavioral process
Re-execute and register startup program after changing execution location
Copy it from the initial execution location to the Recycle Bin of ProgramData on the root drive and rename it (randomly).
[Figure 3 Code copied from existing location to trash can and then re-executed]
[Figure 4 Ransom file created internally when checked with CMD]
Encrypted and organized into final ZIP format
All encrypted files are in zip format, and individual IDs are entered at the end of the files.
[Figure 5 Instruction notes and encrypted files inside the zip file]
[Figure 6 Internal individual ID confirmed by HxD]
Infection results
When encryption is performed, the existing files and guidance notes are contained in a compressed form of <existing name.existing extension.[unique ID].zip>.
[Figure 7 Infection results]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
[Figure 8 Block message]