- Distribution Method : Unknown
- MD5 : bdee036808a24145f02edf5a9953330c
- Major Detection Name : Troj/Jigsaw-K (Sophos), Ransom_JIGSAW.SM (Trend Micro)
- Encrypted File Pattern : .CONTACT_++[pab.luk200@wp.pl]++.LOCKED_by_pablukl0cker_ransomware!
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\OfficeUpdate
- C:\Users\%UserName%\AppData\Local\OfficeUpdate\svchost.exe
- C:\Users\%UserName%\AppData\Roaming\Documents
- C:\Users\%UserName%\AppData\Roaming\Documents\Address.txt
- C:\Users\%UserName%\AppData\Roaming\Documents\dr
- C:\Users\%UserName%\AppData\Roaming\Documents\EncryptedFileList.txt
- C:\Users\%UserName%\AppData\Roaming\GoogleChromeUpdate
- C:\Users\%UserName%\AppData\Roaming\GoogleChromeUpdate\msconfig.exe
- Major Characteristics :
- Offline Encryption
- Ramsey Ransomware series
- Create a fake ".NET Framework Initialization Error" message
- Automatically delete encrypted files every hour
List