- Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
- MD5 : 130c887ba694f81ba3b20bdea52e6a8c
- Major Detection Name : Ransom.RSAUtil (Malwarebytes), Ransom_DONTSLIP.D (Trend Micro)
- Encrypted File Pattern : .[alexjer554@gmx.com].ID<Random>
- Malicious File Creation Location :
- ...\cripter\Clearr.cmd
- ...\cripter\config.cfg
- ...\cripter\DECODE_ALL_FILES.bat
- ...\cripter\DesktopImg
- ...\cripter\How_return_files.txt
- ...\cripter\image.jpg
- ...\cripter\INFOFILE
- ...\cripter\libeay32.dll
- ...\cripter\msvcr90.dll
- ...\cripter\NE SPAT.bat
- ...\cripter\start_notepad.bat
- ...\cripter\svhosts.exe
- Payment Instruction File : How_return_files.txt
- Major Characteristics :
- Offline Encryption
- Disable system restore (vssadmin.exe delete shadows /all /quiet, bcdedit.exe /set {default} recoveryenabled no, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures)
- Delete event log
- Changes desktop background (...\cripter\image.jpg)
List