Cryakl Ransomware (email-blackdragon43@yahoo.com.ver-CL 1.5.1.0.id-<Random>-<Random>.fname-<Original Filename>.<Original Extension>.doubleoffset)
2019. 04. 05. 4,313
Distribution Method : Unknown MD5 : 4cc0b1a3e3a4938a04567bde145c9e1d Major Detection Name : a variant of Win32/Kryptik.GQKH (ESET), Trojan:Win32/Bluteal!rfn (Microsoft) Encrypted File Pattern : email-blackdragon43@yahoo.com.ver-CL 1.5.1.0.id-<Random>-<Random>.fname-<Original Filename>.<Original Extension>.doubleoffset Malicious File Creation Location : - C:\Users\%UserName%\AppData\Local\Temp\<Random>.exe - C:\Windows\System32\Tasks\VssDataRestore Payment Instruction File : README.txt Major Characteristics : - Offline Encryption - Neutralizes system recovery by adding to task schedular: VssDataRestore, which executes command "vssadmin delete shadows /all /quiet"
List