- Distribution Method : Automatic infection using exploit by visiting website
- MD5 : e2e273ed70d4bb8d248c9a371feaa11b
- Encrypted File Pattern : .<5~10-Digit Random Extension>
- Malicious File Creation Location : C:\Users\%UserName%\AppData\Local\Temp\<Random>.tmp
- Payment Instruction File : <Encryption Extension>-MANUAL.txt
- Major Characteristics :
- Offline Encryption
- Disable system restore (wmic.exe shadowcopy delete)
- Changes desktop background (C:\Users\%UserName%\AppData\Local\Temp\bxmeoengtf.bmp)
List