Ransomware Detected
Detects ransomware files in AhnLab EPP V3 malware alert logs.
Query
The AhnLab V3 antivirus engine detects ransomware with signatures such as
Ransomware/Win.Gunra.C5761824, Ransomware/Win.Hades.R374581,
Trojan/Win32.ClopRansom.R356895, Ransomware/Win.BlackByte.R455522,
Malware/Win32.Ransom.C4006138, Win-Trojan/Gandcrab.Exp, etc.
Therefore, alerts are extracted when the signature value starts with Ransomware/ or contains .Ransom. or Gandcrab.
Message
- AhnLab EPP V3 Ransomware Detected: Host $host_ip, Malware $signature
Output Field Order
- _log_time, hostname, host_ip, emp_name, dept_name, signature, file_path, file_status, md5
Threat Analysis
- Ransomware encrypts system files and demands payment for decryption. Even a single infected endpoint can lead to widespread disruption and significant data loss across the organization.
- In many cases, V3 may detect ransomware immediately upon file introduction, but there is still a possibility that encryption attempts, payload execution, or propagation activities have already begun on the affected endpoint.
- If file encryption by ransomware has been observed, the attack may continue with additional module installation, backup deletion, and further encryption, requiring immediate isolation and remediation.
False Positive
- False positives may occur during internal ransomware simulation exercises or malware analysis testing performed by the security team.
Response Actions
- Immediately isolate the affected endpoint from the network and check for ongoing encryption or abnormal file modifications.
- Review process lists, task scheduler entries, and service creation records to identify ransomware processes or related activities.
- Determine whether additional endpoints in the same user account scope or network segment show signs of infection, and investigate organization-wide spread if necessary.
- Verify backup integrity, initiate recovery procedures, and analyze the infection vector (vulnerability exploitation, spear-phishing, remote access compromise, etc.) to prevent recurrence.
MITRE ATT&CK
- Tactic
- Impact
- Technique
- Name: Data Encrypted for Impact
- ID: T1486
- Reference URL: https://attack.mitre.org/techniques/T1486/