Views:

Solutions Available

Virus Pattern

DETECTION NAMEPATTERN VERSION
Ransom.Win32.MAILTO.AB15.655.00
Ransom.Win32.MAILTO.AB.note15.651.00

Predictive Machine Learning

DETECTION NAMEPATTERN VERSION
TROJ.Win32.TRX.XXPE50F13009In-the-Cloud

Behavior Monitoring

DETECTION NAMEPATTERN VERSION
Malware Behavior Blocking1.979.00

Intrusion Prevention Rules in Deep Security

RULES
1007598 - Identified Possible Ransomware File Rename Activity Over Network Share
1007912 - Identified Possible Ransomware File Rename Activity Over Network Share – Client
1007596 - Identified Possible Ransomware File Extension Rename Activity Over Network Share
1007913 - Identified Possible Ransomware File Extension Rename Activity Over Network Share – Client

Sandbox

DETECTION NAMEPATTERN VERSION
VAN_RANSOMWARE.UMXXN/A

Indicators of Compromise

DetectionSHA1
Ransom.Win32.MAILTO.ABE393A9ECF0D0A8BABAA5EFCC34F10577AFF1CAD1
Ransom.Win32.MAILTO.AB.note81e44a55c2af98080d26be11923dbaea7c1b38d8
Ransom.Win32.MAILTO.AB.note2BAAC9E0940E99FC44D319F9F2F3DCE323702914

Prevention and Containment

Containment is possible by installing a Trend Micro endpoint agent such as OfficeScan, Apex One, Deep Security, or Worry-Free Business Security, and configuring to best practices.

Make sure to configure your solutions to its best practice settings, making sure that the following key features are enabled for your Endpoint Security:

  • Smart Scan – Threat patterns are stored in cloud and are updated every hour.
  • Predictive Machine Learning – Proactive solution for threats that are not yet known to our patterns
  • Behavior Monitoring – Monitors process activity for any malicious attempts to change critical settings and unauthorized file modification
  • Agent Self Protection – If enabled and configured with a password, users and processes will not be able to make unauthorized changes to your security software.

Recovery

Worry Free Business Security, Apex One, or Deep Security will be able to clean up the ransomware notes left.

File recovery is not possible post infection as after evaluating the threat, there is no known way to decrypt the files.

It is recommended to restore from back-up all encrypted files. One good safe computing practice is to ensure you have accurate back-ups of your files. The 3-2-1 principle should be in play: three copies, two different media, one separate location. Windows has a feature called Volume Shadow Copy that allows you to restore files to their previous state and is enabled by default.