- Distribution Method : Unknown
- MD5 : 093d2634168cf168d59bfa49550a4010
- Major Detection Name : Gen:Variant.Ransom.BitPaymer.9 (BitDefender), Trojan.Win32.Streamer.ea (Kaspersky)
- Encrypted File Pattern : .locked
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\<Random>.cmd
- C:\Users\%UserName%\AppData\Roaming\<Random>\<Random>.exe
- C:\Users\%UserName%\AppData\Roaming\<Random>~1
- C:\Users\%UserName%\AppData\Roaming\<Random>~1:bin
- Payment Instruction File : <Original Filename>.<Original Extension>.readme_txt
- Major Characteristics :
- Offline Encryption
- Creates executable ADS file. When this file executes, it replaces one of the windows service to ransomware itself.
- Disable system restore (vssadmin.exe Delete Shadows /All /Quiet)
List