Views:

Actions Taken

  • Malware Sourcing
  • Testing samples against Trend Micro Detections
  • Trend Micro Technical Support and Core Technology Team collaboration for sourcing, monitoring and intelligence gathering

Solutions Available

Solution ModulesSolution AvailablePattern BranchRelease DateDetection/Policy/Rules
URL ProtectionYesIn the CloudMalware Accomplice, Disease Vector, Ransomware
Predictive Learning (TrendX)TROJ.Win32.TRX.XXPE50FFF034
Ransom.Win32.TRX.XXPE50FFF034
BKDR.Win32.TRX.XXPE50FFF034
File detection (VSAPI/Smart Scan) and Advanced Threat Scan Engine (ATSE)15.529.0010/12/2019Ransom.Win32.MAZE.H
Ransom.Win32.MAZE.THKBIAI
Ransom_Gen.R011C0PKA19
Ransom_Maze.R002C0DC720
Ransom_Instructions.R002C0PCK20
Ransom.Win32.MAZE.THJBBAI
Ransom.Win32.MAZE.SMDA
TROJ_GEN.USMGAHAL
Ransom.Win32.MAZE.G
Ransom.Win32.MAZE.C
Ransom_Mazedec.R002C0DDE20
Trojan.Win32.SMOKELOAD.SMD2.hp
Ransom.Win32.MAZE.AC
TROJ_GEN.R002C0DDE20
Behavioral Monitoring (AEGIS)2015Q_CQ, RAN2455T TMTD policies
Access Document Control (ADC) Supported
Sandbox SolutionVAN_RANSOMARE.UMXX
Deep Discovery Inspector RuleRule 1043 RANSOM HTTP REQUEST
TippingPoint37302: HTTP: Ransomware.Win32.Maze.A
Deep Security1007596 - Identified Suspicious File Extension Rename Activity Over Network Share
1007598 - Identified Suspicious Rename Activity Over Network Share
 
Refer to this file for the IOC list.
 

Recommendation

Make sure to always use the latest pattern available to detect the old and new variants of Maze ransomware.

Related Blogs and Articles

TrendMicro Virus Encyclopedia