Difference between revisions of "Simplocker"

From Botnets.fr
Jump to navigation Jump to search
 
m (Text replacement - "=Unknown" to "=")
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Botnet
{{Botnet
|Introduction=Android/Simplocker.A will scan the SD card for files with any of the following image, document or video extensions: jpeg, jpg, png, bmp, gif, pdf, doc, docx, txt, avi, mkv, 3gp, mp4 and encrypt them using AES.
|Target=Android
|CCProtocol=Tor
|Feature=Encrypt files, MoneXy payment, AES encryption,
|Checksum=808df267f38e095492ebd8aeb4b56671061b2f72,
|Status=
|BeginYear=2014
|EndYear=
|Group=Ransomware, Cryptolocker,
|Fonctionnalités=* [[feature::Encrypt files]]
|Fonctionnalités=* [[feature::Encrypt files]]
|UserAgent=Unknown
|CCProtocol=TOR
|Target=Android
|Status=Unknown
|BeginYear=Unknown
|EndYear=Unknown
|Group=Ransomware
|Victime4=
|Victime4=
}}
}}

Latest revision as of 15:43, 8 August 2015

(Botnet) Link to the old Wiki page : [1] / Google search: [2]

Simplocker
Alias
Group Ransomware, Cryptolocker
Parent
Sibling
Family
Relations Variants:

Sibling of:
Parent of:
Distribution of:
Campaigns:

Target Android
Origin
Distribution vector
UserAgent
CCProtocol Tor (Distributed-centralized)
Activity 2014 /
Status
Language
Programming language
Operation/Working group

Introduction

Android/Simplocker.A will scan the SD card for files with any of the following image, document or video extensions: jpeg, jpg, png, bmp, gif, pdf, doc, docx, txt, avi, mkv, 3gp, mp4 and encrypt them using AES.

Features


Associated images

Checksums / AV databases

  • 808df267f38e095492ebd8aeb4b56671061b2f72 | Virustotal




Publications

 AuthorEditorYear
ESET analyzes first Android file-encrypting, TOR-enabled ransomwareRobert LipovskyESET2014