- Distribution Method : Unknown
- MD5 : c874d649f6cc1300cb62ea86d7a0a2b2
- Major Detection Name : Ransom:Win32/Tescrypt.C (Microsoft), Ransom.TeslaCrypt (Norton)
- Encrypted File Pattern : .abc
- Malicious File Creation Location :
- C:\Users\%UserName%\Documents\Recovery_File_<Random>.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\restore_files_<5-Digit Random>.html
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\restore_files_<5-Digit Random>.txt
- C:\Users\%UserName%\AppData\Roaming\<Random>.exe
- Payment Instruction File : RESTORE_FILES.BMP / restore_files_<5-Digit Random>.html / restore_files_<5-Digit Random>.txt
- Major Characteristics :
- Offline Encryption
- Disable system restore (vssadmin.exe delete shadows /all /Quiet)
List