

Each victim receives a pair of unique keys - these are stored on a remote server controlled by cyber criminals. Unfortunately, this information is accurate. Therefore, victims can detect the infection early and terminate it before encryption is complete.Īs usual, the new text file contains a message stating that data is encrypted using AES-128 and RSA-2048 algorithms and, thus, can only be restored with unique keys. Fortunately, this makes the entire process very slow. FOX" filename pattern):įOX checks whether files are opened and, if so, closes them before encryption.

Additionally, FOX ransomware changes victim's desktop wallpaper. After performing these functions, FOX generates a text file (" #FOX_README#.rtf") and places a copy in every existing folder. In addition, FOX performs a number of other malicious actions, including deletion of File Shadow Volume Copies and removal of Windows Recovery Startup. Once encrypted, data becomes unusable and indistinguishable. FOX" pattern (e.g., " sample.jpg" might be renamed to a filename such as " ].3qAbTbsd-RgfExin0.FOX"). Once infiltrated, FOX encrypts most stored data and renames files using the ". Developers proliferate this malware using Remote Desktop Service - they hijack victims' computers and install FOX manually. Discovered by MalwareHunterTeam, FOX is a new variant of high-risk ransomware called Matrix.
