


It also has an unusual time and date stamp: The binary find.exe has eight sections and the raw size of its.

Key.bat, run.js, and find.exe are three files that play a vital role in the encryption process. The binary 39c510bc504a647ef8fa1da8ad3a34755a762f1be48e200b9ae558a41841e502 was spotted in the wild at hxxp://62.152.47.251:8000/w/find.exe it may be part of a drive-by download strategy or was hosted on a legitimate site. Generally, this type of malware spreads by spam email, malicious attachments, exploits, or fraudulent downloads. This ransomware was first seen at the beginning of March. GPGQwerty consists of a bundle of files that runs together to encrypt a victim’s machine. The three files themselves will not encrypt anything. We found these hashes need many support files for successful execution. We analyzed the following SHA-256 hashes of the malware GPGQwerty: Although ransomware using GnuPG to encrypt files is not unique, it is uncommon.
#FREE PRIVACY GUARD SOFTWARE#
GnuPG is a hybrid-encryption software program that uses a combination of conventional symmetric-key cryptography for speed and public-key cryptography to ease the secure key exchange. McAfee Labs has recently observed a new variant of ransomware that relies on the open-source program GNU Privacy Guard (GnuPG) to encrypt data.
