- Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
- MD5 : ff5367b375ee5aa583927e8d4ac12d87
- Major Detection Name : a variant of Win32/Filecoder.Rapid.A (ESET), Trojan.Win32.Z.Ransom.933376.A (ViRobot)
- Encrypted File Pattern : .no_more_ransom
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\info.exe
- C:\Users\%UserName%\AppData\Roaming\recovery.txt
- C:\Windows\System32\Tasks\Encrypter
- Payment Instrucition File : How Recovery Files.txt / recovery.txt
- Major Characteristics :
- Offline Encryption
- Disable and Blocks Task Manager (Taskmgr.exe)
- Block processes execution (msftesql.exe, oracle.exe, sqlagent.exe, sqlbrowser.exe, sqlservr.exe, sqlwriter.exe etc.)
- Disable system restore (vssadmin.exe Delete Shadows /All /Quiet, bcdedit.exe /set {default} recoveryenabled No, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures, wbadmin DELETE SYSTEMSTATEBACKUP, wmic SHADOWCOPY DELETE)
- Adds Encrypter to scheduler to execute "%AppData%\info.exe" every minute
List