AXLocker, Octocrypt, And Alice: New Wave Of Ransomware
malware
ransomware
New ransomware groups are evolving and expanding the scope of their operations for financial gain.
Figure 1 – Static file details of AXLocker ransomwareUpon execution, the ransomware hides itself by modifying the file attributes and calls the startencryption() function to encrypt files, as shown below. Figure 6 – Encrypted file by AXLocker ransomwareAfter encrypting the victim’s files, the ransomware collects and sends sensitive information such as Computer name, Username, Machine IP address, System UUID, and Discord tokens to TA, as shown in the below figure. The image below shows the encrypted file of the ransomware after the successful infection on the victim’s machine.
Source read time: 7 min - cloudsecurityalliance.org
Also offered in: Nederlands