- Distribution Method : Unknown
- MD5 : 3cf87e475a67977ab96dff95230f8146
- Major Detection Name : Trojan.Ransom.LockCrypt (ALYac), HEUR:Trojan.Win32.AntiAV (Kaspersky)
- Encrypted File Pattern : .<Original Extension> id-<Random>.BI_D
- Malicious File Creation Location :
- C:\Windows\DECODE.KEY
- C:\Windows\notepad+++.exe
- C:\How To Restore Files.txt
- Payment Instruction File : How To Restore Files.txt
- Major Characteristics :
- Offline Encryption
- DXXD / MrDec Ransomware series
- Encryption starts after killing all process except listed in whitelist processes
- Turns off User Access Control (UAC)
- Disable system restore (vssadmin delete shadows /all)
- Deletes event log
List