- Distribution Method : Mail attachment
- MD5 : f2a413f8c49a1bda7b540902c8bfdc92
- Major Detection Name : Ransom:MSIL/Ryzerlo.A (Microsoft), Ransom_CRYPTEAR.SM (Trend Micro)
- Encrypted File Pattern : .locked
- Malicious File Creation Location : C:\Users\%UserName%\table.exe
- Payment Instruction File : READ_IT.txt
- Offline Encryption
- Hidden-Tear Open Source based Ransomware - Encrypts only files located in Desktop
List