Description
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
jigsaw.bin
283KB
220416-rlfd4shfb5
2773e3dc59472296cb0024ba7715a64e
27d99fbca067f478bb91cdbcb92f13a828b00859
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
jigsaw.bin
2773e3dc59472296cb0024ba7715a64e
283KB
27d99fbca067f478bb91cdbcb92f13a828b00859
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
Ransomware generally changes the extension on encrypted files.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.