请使用手机微信扫码安全登录

切换账号密码登录

绑定手机号

应国家法规对于账号实名的要求,请您在进行下一步操作前,需要先完成手机绑定 (若绑定失败,请重新登录绑定)。了解更多

不绑定绑定手机号

360官网 | 360商城

推荐论坛版块活动360粉丝商城众测粉丝轰趴馆常见问题
相关阅读:
CryLock勒索软件家族详情
CryLock勒索病毒分析


【家族名】
Win32/Ransom.Trigona
[平台]   /   [主类型]  .  [家族名]
平台类型 :  Win32 Win64
威胁类型 : Ransom
【是否支持解密】
360解密大师:暂不支持
在线解密:暂不支持
【被加密文件】
被加密文件后缀格式: 修改文件后缀为_locked


【勒索提示信息】:
文件名:how_to_decrypt.hta
-------------------------------------------------------------------------
--START_OF_DATA--
40434C41444944443431443843443938463030423230344539383030393938454346383432374544343144384344393846303042323034453938303039393845434638343237450000001643303046313941322D453243372D33343642444144370000054B0000020099D8103ED833EE87A27284A63EF8E0BD7AF8F6D3390B0E70BE96D9D097C46E6640510B81AB8F1145BC29B2CD2E357B9C2B4E3FACE13BE128B0E3E40C673BC02F976FBA5CB108F548A62EBE967CF6962AEBF73ECABCA2776EAA519E5FFAECF2A2748886F3518C03ED4F6270940C0AEE24D29C4E6A65351CDC9A3AABD47AC1DAF8D64F95EB8C5BAE2E9FA69C595419656E9FE3647A76C6D2DCD5A5AFE14C88510EDA4F3F8F97B8EF1E7DF19659F9FEF11A17290CF836E063C1A9A34FAA569EF145E335E8E6B151737D3983A41FC02DA962CD77AEF1359F8B8B8F60B4A43D4AFA4AB1C81E33A3A4816EE71F84BC9C0AA3B3186844270DA74BFB6559B24CB790866B78F95A1C716A63CC048772CFB6A67BFB9B6506B638CD10EE553A0EE8ED71A0B6213ED77AE0CC39452CC47E3B8AA92FC669C4CAF6088C5F2D29EAE8DC496BDB53A44ECF1EE28346C810A04C49F393FF51DCA2299F08DCB4B773BBE2536FDF13AB0D9E8702985EB80AA087ABDD2CE24B40B948F687D830D082BEC50000E8103992719B9D9700F207CA070AB576D909C1A5D354D4FD1F25D8BFEB8CD04E0403E8B994DFE1D2CF2C55F8754D7255E1282C40EC7FC8F1E13430373C38B1A1191ECC7570D398420A7F67EA8370A3D0E6C84B48E1CA8520FCF3FB3148A67E4C0B0A5F764DAE815A830F89A588A5C954B9254C4DA713B81306D9B34C46D1F20FE4A66D7300000343C111C9946947797FC32535A972158142B148074590A7516E1B67A3B975EADC432BD6BA8F4BF19A0E7DF090B6FDD4D24692EDCD65AD24F09BF051D6F76EA8A8E36D41A4B538632DFC30D65FC345CE3F5A4B61A1424510952D119CD3DF22433C099C0D7BA40379D2934B945E2BD923CDEC3B42D8DF18EE54690B7C04A31D0A769E28695393BCEABAD3DA288FA1F3CA12B0FC52F7E29E5E374A590E875B3B7D0CFC29EED9BE674E0740BC75FC810D522DCF43F803216736339C96ED7E33A4BC50F13F99FE428EFC851AECD90D629B083A480B7668321B26A736934F8F1334A7714B59C2C87200A583DCDF0A78F4D6ECB8CA750733F54B9F66FF01480E06F4F36CB258C4ABE849E69E77F059E75D226057A096F2897DDA40ADE16CD551DE3D433632C00C320511BEC0F0F039B8A7CB15336F653E94A01D676D859281A58CE2AF9E8775CF61CFF65420E56350001D508B21866CB36EF52E9185FED4703B5E773378F52DC9414650E8651A2BE77AF50D665E51A8999CFF914748B48EC3E6715F16430CD6875BAE33F2BF6ED18242CEC3DACFE16BE2AAFC2BCD155A62FC25E398C2064D8559F7431CE1D5E47D58B295EE2B80B2F66CA9181A85A28DED267B5175B1DD8484579008D632FDACD038A1A44C056D3A9588B881BD38ADF721D3022C4B3775CC8520768EFD8AAA7B055AB7D91D8D0B098FC2CCE94D0CB80443B6BF73B8A8FA17269636C2A95B6643731C2955387CC67C72C4D40013523352B345195DEFE711B676753814DF80605B59F9B8F99477EF1006D366343AD6C32C62B204B2C0CCDA985B6306E63103DAFDE86BB06F2FC2890B740F64463412E789A735312C058ED1877C1CEA1C924BFC21EDFABA13EAD429BC4E632ED852F0014D0A411051E425A5D5E291C017944B2666506508855D925173E0A696D820E9C61B63C32563CEE974ADB73517847562D30D5F633A6FB2D0BBF523B0ED79949758F8921CC3A8E375C8CDE61F1894E635EB54D50D830C8F5FEE4DE336131C249B4D5F42318E31C46278E1A102398EC1C7AFBE88E92CF34B1241ED5E0A85949751BADE134AB3034AEE95E18A7CB7F604B0D9A4AFBFF58E4FC2D887C6F4954DC1022972144C7DF9A0461171E387046500925454E054E0204370F51B9A43BEAE8165760B8FA18669FF2C416D0858ADBA03411C25316AA84E6BB09DA5B44F9CA82091DDE4FCBF1E88EFAB170B910C523DFCC8D4E130954EEB0559B0BC64ADF2E83345F3893632BFA177F97DDCAB2E117B43125DEA39EFA7AAFBAD4369B4F3C04650A5D00378E5725924B7EEB8AD9E544F544A3D423876C1EB78F4AC4B0C51E2F8325003CA96B27490356CB95F12340BA5FF7914DA091C000000873336453643453730363537423133323844323638303831443530323338463436731FB631062BCCF3CA7EE0E38359715757E012079A5E5226EA6768D7A7BF99543643433635354135443936313939463437433141344646323636334431443434
--END_OF_DATA--
the entire network is encrypted
your business is losing money▲ All documents, databases, backups and other critical data were encrypted and leaked▲ The program uses a secure AES algorithm, which makes decryption impossible without contacting us▲ If you refuse to negotiate, the data will be auctioned off
To recover your data, please follow the instructions
1Download Tor Browser
Download 2Open decryption page
Copy 3Auth using this key
Copy The price depends on how soon you will contact usNeed help? ●Don't doubt
You can decrypt 3 files for free as a guarantee●Don't waste time
Decryption price increases every hour●Don't contact resellers
They resell our services at a premium●Don't recover files
Additional recovery software will damage your data
-------------------------------------------------------------------------
弹窗 :
【赎金谈判页面】


【防护建议】
1.多台机器,不要使用相同的账号和口令
2.登录口令要有足够的长度和复杂性,并定期更换登录口令
3.重要资料的共享文件夹应设置访问权限控制,并进行定期备份
4.定期检测系统和软件中的安全漏洞,及时打上补丁。
5.定期到服务器检查是否存在异常。查看范围包括:
a)是否有新增账户
b) Guest是否被启用
c) Windows系统日志是否存在异常
d)杀毒软件是否存在异常拦截情况
6.安装安全防护软件,并确保其正常运行。
7.从正规渠道下载安装软件。
8.对不熟悉的软件,如果已经被杀毒软件拦截查杀,不要添加信任继续运行。









共 0 个关于Trigona勒索软件家族详情的回复 最后回复于 2023-2-15 17:37

评论

直达楼层

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Potato 产品答疑师

粉丝:9 关注:0 积分:11297

精华:0 金币:11937 经验:7025

IP属地: 北京市

最后登录时间:2024-4-28

私信 加好友

最新活动

社区限时活动 | 五一去哪玩?分享赢好礼

排行榜

热度排行 查看排行
今日 本周 本月 全部
    今日 本周 本月 全部

      内容推荐 热门推荐最新主帖

      扫码添加360客服号,涨知识的同时还有超多福利等你哦

      快速回复 返回顶部 返回列表