Posted 02 March 2017 - 07:15 AM
There are several ransomware infections that do not append an obvious extension to the end of encrypted filenames or add a known file pattern which helps to identify it.
CryptoWall, CrypMic, DMA Locker, Microsoft Decryptor (CryptXXX), PClock, Spora, Cryptofag, TeslaCrypt v4.0, CryptoHost, MotoxLocker, KawaiiLocker, Hermes, LoveServer and Power Worm do not append an obvious extension to the end of encrypted filenames. Some ransomware variants (i.e. DMA Locker, TeslaCrypt, CrypMic) will add a unique hex pattern identifier in the header of every encrypted file so the ransomware can identify the file as one it encrypted. CryptoWall is identified by how the files are renamed. CryptoWall 3.0 and 4.0 encrypted files typically will have the same 16 byte header which is different for each victim.
The best way to identify the different ransomwares that do not append an extension is the ransom note (including it's name), samples of the encrypted files, the malware file itself or at least information related to the email address used by the cyber-criminals to request payment. Without any of that other information it is difficult to determine what you are dealing with.
Based on infection rates and statistics, the two most common ransomware variants that do not change the extension or use a filemarker are PClock and Spora.
.Windows Insider MVP 2017-2018Microsoft MVP Reconnect 2016Microsoft MVP Consumer Security 2007-2015 Member of UNITE, Unified Network of Instructors and Trusted EliminatorsIf I have been helpful & you'd like to consider a donation, click