Blind-Napoleon
Tags
attack-pattern: | Data Server - T1583.004 Server - T1584.004 Software - T1592.002 |
Common Information
Type | Value |
---|---|
UUID | d2bd444b-97b5-40b9-9c87-2214a23b470d |
Fingerprint | 2454587f5a661e33 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 2, 2017, 9:05 a.m. |
Added to db | Jan. 18, 2023, 7:53 p.m. |
Last updated | Sept. 30, 2024, 2:44 p.m. |
Headline | Шифровальщики-вымогатели The Digest "Crypto-Ransomware" |
Title | Blind-Napoleon |
Detected Hints/Tags/Attributes | 20/1/9 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://id-ransomware.blogspot.com/2017/12/blind-2-ransomware.html |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 84 | airmail.cc |
|
Details | Domain | 144 | cock.li |
|
Details | Domain | 24 | rape.lol |
|
Details | 2 | supp01@airmail.cc |
||
Details | 2 | supportdecrypt2@cock.li |
||
Details | 2 | skeleton@rape.lol |
||
Details | 1 | blind@airmail.cc |
||
Details | File | 2 | skeleton.exe |
|
Details | File | 5 | how_decrypt_files.txt |