- Distribution Method : Installation via AZORult malware
- MD5 : 2409c058a86cd8743abb10a5735ef487
- Major Detection Name : a variant of Win32/Kryptik.GIZG (ESET), Mal/GandCrab-B (Sophos)
- Encrypted File Pattern : .Aurora
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\1337\AU3_EXE_2018-07-18_23-01.exe
- C:\Users\%UserName%\AppData\Roaming\1337\Ransom_2018-07-18_23-06.exe
- C:\Users\%UserName%\AppData\Roaming\1337\wall.i
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!-GET_MY_FILES-!.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#RECOVERY-PC#.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\@_RESTORE-FILES_@.txt
- Payment Instruction File : !-GET_MY_FILES-!.txt / #RECOVERY-PC#.txt / @_RESTORE-FILES_@.txt
- Major Characteristics : Changes desktop background (wall.i)
List