{"id":17480,"date":"2021-07-20T06:55:49","date_gmt":"2021-07-20T06:55:49","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=17480"},"modified":"2026-04-17T18:07:45","modified_gmt":"2026-04-17T18:07:45","slug":"a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/","title":{"rendered":"A Look into Source Code of Paradise Ransomware, a &#8220;Custom-Built&#8221; Virus &#8211; 2"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><strong>2. Encrypter: DP_Main<\/strong><\/p>\n\n\n\n<p><strong>2.2 Self Copy and Automatic Running at Startup<\/strong><\/p>\n\n\n\n<p>The program copies itself to <strong>%APPDATA%\/DP\/DP_Main.exe<\/strong>, and modifies the registry for automatic running at startup.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"230\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/14-1024x230.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17481\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/14-1024x230.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/14-300x67.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/14-768x172.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/14-200x45.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/14.jpg 1033w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>2.3 Deletion of Volume Shadow Backups<\/strong><\/p>\n\n\n\n<p>The program uses CMD command parameters to delete volume shadow backups.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"770\" height=\"290\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/15.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17483\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/15.jpg 770w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/15-300x113.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/15-768x289.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/15-200x75.jpg 200w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><\/figure>\n\n\n\n<p><strong>2.4 Upload of Encryption Information<\/strong><\/p>\n\n\n\n<p>After obtaining disk information, the program begins to encrypt local files. After that, it uploads the encryption information and displays the ransom file at <strong>%APPDATA%\/DP\/welldone.dp<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"709\" height=\"215\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/16.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17485\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/16.jpg 709w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/16-300x91.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/16-200x61.jpg 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n\n\n\n<p><strong>2.5 Encryption Details<\/strong><\/p>\n\n\n\n<p>If a file to be encrypted is larger than 64 KB, the program will encrypt only its end; otherwise, it will encrypt the entire file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"976\" height=\"510\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/17.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17487\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/17.jpg 976w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/17-300x157.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/17-768x401.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/17-200x105.jpg 200w\" sizes=\"(max-width: 976px) 100vw, 976px\" \/><\/figure>\n\n\n\n<p>The ransomware preferentially encrypts the database directory.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1021\" height=\"269\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/18.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17489\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/18.jpg 1021w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/18-300x79.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/18-768x202.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/18-200x53.jpg 200w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n\n\n\n<p>Besides, it skips system and browser directories.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"905\" height=\"287\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/19.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17491\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/19.jpg 905w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/19-300x95.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/19-768x244.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/19-200x63.jpg 200w\" sizes=\"(max-width: 905px) 100vw, 905px\" \/><\/figure>\n\n\n\n<p>The ransomware contains the <strong>GetNetwork<\/strong> function. Though the <strong>newview<\/strong> and <strong>newuser<\/strong> commands are executed, this function is not used. Therefore, it may be used for encrypting network shared files.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"727\" height=\"485\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/20.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17493\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/20.jpg 727w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/20-300x200.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/20-200x133.jpg 200w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/><\/figure>\n\n\n\n<p>Note: When encrypting the private key, the original code splices character strings, which may cause key decryption to fail. For this reason, in the analysis, we modified the code to avoid the decryption failure.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"862\" height=\"606\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/21.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17495\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/21.jpg 862w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/21-300x211.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/21-768x540.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/21-200x141.jpg 200w\" sizes=\"(max-width: 862px) 100vw, 862px\" \/><\/figure>\n\n\n\n<p><strong>2.6 Encryption Effect<\/strong><\/p>\n\n\n\n<p>After the encryption is complete, the following file is dropped:<\/p>\n\n\n\n<p>The <strong>DecryptionInfo.auth<\/strong> file is dropped to C:\\Users\\xxx\\Documents or C:\\ProgramFiles(x86)\\DP for saving RSA keys used for encrypting files. The code shown in the following figure begins with the private key encrypted with RSA. The part in the red frame is the public key in plain text.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"775\" height=\"180\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/22.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17497\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/22.jpg 775w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/22-300x70.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/22-768x178.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/22-200x46.jpg 200w\" sizes=\"(max-width: 775px) 100vw, 775px\" \/><\/figure>\n\n\n\n<p>In <strong>%APPDATA%\\DP<\/strong>, the program copies itself. Files with the extension of dp respectively record whether the program successfully runs as admin and whether file encryption is complete.<\/p>\n\n\n\n<p>Then an <strong>id.dp<\/strong> file is created in the same directory as the program to save information, which may be used to identify attackers.<\/p>\n\n\n\n<p>In each folder, a <strong>#DECRYPTMYFILES#.html<\/strong> file is created, which is empty by default. Attackers will write to the file.<\/p>\n\n\n\n<p><strong>3. Key Decrypter: DP_Keygen<\/strong><\/p>\n\n\n\n<p>This program decrypts the RSA private key, which is used for encryption, via the MasterRSA private key. For this purpose, the <strong>ExtraKey.dp<\/strong> file (generated by DP_Builder) should be in the same directory as the program, as shown in the following figure.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"714\" height=\"586\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/23.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17499\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/23.jpg 714w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/23-300x246.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/23-200x164.jpg 200w\" sizes=\"(max-width: 714px) 100vw, 714px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ol class=\"wp-block-list\"><li>encrypted private key, usually saved in C:\\ProgramFiles(x86)\\DP\\DecryptionInfo.auth on the compromised host.<\/li><li>decrypted RSA private key (Base64-encoded).<\/li><li>The victim ID (obtained from <strong>id.dp<\/strong> in the victim&#8217;s machine or the encrypted file name) can be used to query the encrypted private key, which, after being decrypted, is displayed locally. The code is as follows:<\/li><\/ol>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"828\" height=\"376\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/24.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17501\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/24.jpg 828w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/24-300x136.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/24-768x349.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/24-200x91.jpg 200w\" sizes=\"(max-width: 828px) 100vw, 828px\" \/><\/figure>\n\n\n\n<p>DP_Keygen, after being executed, loads the <strong>ExtraKey.dp<\/strong> file locally. This file saves the private key information of MasterRSA. If the file is locally unavailable, the program attempts to obtain it from the server.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"766\" height=\"433\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/25.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17503\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/25.jpg 766w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/25-300x170.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/25-200x113.jpg 200w\" sizes=\"(max-width: 766px) 100vw, 766px\" \/><\/figure>\n\n\n\n<p><strong>4. Decrypter: DP_Decrypter<\/strong><\/p>\n\n\n\n<p>Type the decrypted RSA private key and click <strong>Check sytax of key<\/strong>. If the private key is useful, continue to decrypt all files or a single file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"839\" height=\"457\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/26.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17505\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/26.jpg 839w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/26-300x163.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/26-768x418.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/26-200x109.jpg 200w\" sizes=\"(max-width: 839px) 100vw, 839px\" \/><\/figure>\n\n\n\n<p>Interestingly, this decrypter adds a restriction to <strong>Decrypt all PC<\/strong>. The full verification switch can be turned on only when the fourth character of the private key is &#8220;t&#8221;, which will be deleted during decryption.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"814\" height=\"327\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/27.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17507\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/27.jpg 814w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/27-300x121.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/27-768x309.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/27-200x80.jpg 200w\" sizes=\"(max-width: 814px) 100vw, 814px\" \/><\/figure>\n\n\n\n<p>Victims can decrypt files only after obtaining the decrypted private key and <strong>DP_Decrypter.exe<\/strong> from attackers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"818\" height=\"556\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/28.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-17509\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/28.jpg 818w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/28-300x204.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/28-768x522.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/07\/28-200x136.jpg 200w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Recommended Practices Against Ransomware<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Step up training on employees&#8217; security awareness so that they will not open emails from unknown senders or run programs from unidentifiable sources.<\/li><li>Avoid opening high-risk ports like 445, 139, and 3389 and use NIPS, firewalls, or the like to protect against these ports.<\/li><li>Enable the Windows firewall and secure the access to RDP and SMB services through controls such as the access control list (ACL).<\/li><li>Configure Windows group policy settings to form an account lockout policy so that accounts with a certain consecutive number of failed login attempts in a short period will be locked.<\/li><li>Increase the complexity of host account passwords and set the password change cycle to a short period. Besides, avoid using common passwords or passwords with logical meanings.<\/li><li>Change the default user name of the system administrator to avoid using common ones such as <strong>admin<\/strong>, <strong>administrator<\/strong>, and <strong>test<\/strong>.<\/li><li>Install antivirus software with self-protection to avoid being shut down or terminated by hackers, and keep the virus database up to date.<\/li><li>Promptly apply security patches to the operating system and other applications to fix high-risk vulnerabilities.<\/li><li>Back up mission-critical business data regularly to avoid issues incurred by data corruption or loss.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>2. Encrypter: DP_Main 2.2 Self Copy and Automatic Running at Startup The program copies itself to %APPDATA%\/DP\/DP_Main.exe, and modifies the registry for automatic running at startup. 2.3 Deletion of Volume Shadow Backups The program uses CMD command parameters to delete volume shadow backups. 2.4 Upload of Encryption Information After obtaining disk information, the program begins [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5],"tags":[603],"class_list":["post-17480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Look into Source Code of Paradise Ransomware, a &quot;Custom-Built&quot; Virus - 2 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Look into Source Code of Paradise Ransomware, a &quot;Custom-Built&quot; Virus - 2 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"2. Encrypter: DP_Main 2.2 Self Copy and Automatic Running at Startup The program copies itself to %APPDATA%\/DP\/DP_Main.exe, and modifies the registry for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T06:55:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"A Look into Source Code of Paradise Ransomware, a &quot;Custom-Built&quot; Virus - 2 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"2. Encrypter: DP_Main 2.2 Self Copy and Automatic Running at Startup The program copies itself to %APPDATA%\/DP\/DP_Main.exe, and modifies the registry for\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"A Look into Source Code of Paradise Ransomware, a &#8220;Custom-Built&#8221; Virus &#8211; 2\",\"datePublished\":\"2021-07-20T06:55:49+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/\"},\"wordCount\":841,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"keywords\":[\"Ransomware\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/\",\"name\":\"A Look into Source Code of Paradise Ransomware, a \\\"Custom-Built\\\" Virus - 2 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"datePublished\":\"2021-07-20T06:55:49+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"width\":562,\"height\":334,\"caption\":\"Ransomware concept with locked padlock and chains.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Look into Source Code of Paradise Ransomware, a &#8220;Custom-Built&#8221; Virus &#8211; 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Look into Source Code of Paradise Ransomware, a \"Custom-Built\" Virus - 2 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"A Look into Source Code of Paradise Ransomware, a \"Custom-Built\" Virus - 2 - NSFOCUS","og_description":"2. Encrypter: DP_Main 2.2 Self Copy and Automatic Running at Startup The program copies itself to %APPDATA%\/DP\/DP_Main.exe, and modifies the registry for","og_url":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/","og_site_name":"NSFOCUS","article_published_time":"2021-07-20T06:55:49+00:00","article_modified_time":"2026-04-17T18:07:45+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"A Look into Source Code of Paradise Ransomware, a \"Custom-Built\" Virus - 2 - NSFOCUS","twitter_description":"2. Encrypter: DP_Main 2.2 Self Copy and Automatic Running at Startup The program copies itself to %APPDATA%\/DP\/DP_Main.exe, and modifies the registry for","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"A Look into Source Code of Paradise Ransomware, a &#8220;Custom-Built&#8221; Virus &#8211; 2","datePublished":"2021-07-20T06:55:49+00:00","dateModified":"2026-04-17T18:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/"},"wordCount":841,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","keywords":["Ransomware"],"articleSection":["Blog","DDoS Mitigation"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/","url":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/","name":"A Look into Source Code of Paradise Ransomware, a \"Custom-Built\" Virus - 2 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","datePublished":"2021-07-20T06:55:49+00:00","dateModified":"2026-04-17T18:07:45+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","width":562,"height":334,"caption":"Ransomware concept with locked padlock and chains."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/a-look-into-source-code-of-paradise-ransomware-a-custom-built-virus-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"A Look into Source Code of Paradise Ransomware, a &#8220;Custom-Built&#8221; Virus &#8211; 2"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=17480"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12292"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=17480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=17480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=17480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}