The Long Run of Shade Ransomware
Security Affairs
FEBRUARY 19, 2019
Technical analysis. This file acts as downloader in the infection chain, using a series of hard-coded server addresses, It heavily rely on obfuscation and encryption to avoid the antimalware detection. Shade encrypts all the user files using an AES encryption scheme. References to an Oil-Gas company.
Let's personalize your content