Home / malwarePDF  

OSX.Ransomcrypt


First posted on 10 November 2015.
Source: Symantec

Aliases :

There are no other names known for OSX.Ransomcrypt.

Explanation :

Once executed, the Trojan copies itself to the following location:
$HOME/Desktop/mabouia_Decrypter

Next, the Trojan encyrpts files found in the following directory:
$HOME/Desktop/ransom

The Trojan then creates and opens the following .txt file:
$HOME/Desktop/READ-Me.txt

The .txt file contains a ransom note.



The Trojan also connects to the following remote location:
creativecode.com.br

Last update 10 November 2015

 

TOP