Solutions Available
Virus Pattern
| DETECTION NAME | PATTERN VERSION |
|---|---|
| Ransom.Win32.MAILTO.AB | 15.655.00 |
| Ransom.Win32.MAILTO.AB.note | 15.651.00 |
Predictive Machine Learning
| DETECTION NAME | PATTERN VERSION |
|---|---|
| TROJ.Win32.TRX.XXPE50F13009 | In-the-Cloud |
Behavior Monitoring
| DETECTION NAME | PATTERN VERSION |
|---|---|
| Malware Behavior Blocking | 1.979.00 |
Intrusion Prevention Rules in Deep Security
| RULES |
|---|
| 1007598 - Identified Possible Ransomware File Rename Activity Over Network Share |
| 1007912 - Identified Possible Ransomware File Rename Activity Over Network Share – Client |
| 1007596 - Identified Possible Ransomware File Extension Rename Activity Over Network Share |
| 1007913 - Identified Possible Ransomware File Extension Rename Activity Over Network Share – Client |
Sandbox
| DETECTION NAME | PATTERN VERSION |
|---|---|
| VAN_RANSOMWARE.UMXX | N/A |
Indicators of Compromise
| Detection | SHA1 |
|---|---|
| Ransom.Win32.MAILTO.AB | E393A9ECF0D0A8BABAA5EFCC34F10577AFF1CAD1 |
| Ransom.Win32.MAILTO.AB.note | 81e44a55c2af98080d26be11923dbaea7c1b38d8 |
| Ransom.Win32.MAILTO.AB.note | 2BAAC9E0940E99FC44D319F9F2F3DCE323702914 |
Prevention and Containment
Containment is possible by installing a Trend Micro endpoint agent such as OfficeScan, Apex One, Deep Security, or Worry-Free Business Security, and configuring to best practices.
Make sure to configure your solutions to its best practice settings, making sure that the following key features are enabled for your Endpoint Security:
- Smart Scan – Threat patterns are stored in cloud and are updated every hour.
- Predictive Machine Learning – Proactive solution for threats that are not yet known to our patterns
- Behavior Monitoring – Monitors process activity for any malicious attempts to change critical settings and unauthorized file modification
- Agent Self Protection – If enabled and configured with a password, users and processes will not be able to make unauthorized changes to your security software.
Recovery
Worry Free Business Security, Apex One, or Deep Security will be able to clean up the ransomware notes left.
File recovery is not possible post infection as after evaluating the threat, there is no known way to decrypt the files.
It is recommended to restore from back-up all encrypted files. One good safe computing practice is to ensure you have accurate back-ups of your files. The 3-2-1 principle should be in play: three copies, two different media, one separate location. Windows has a feature called Volume Shadow Copy that allows you to restore files to their previous state and is enabled by default.
