- Distribution Method : Unknown
- MD5 : b82d4f4de0267353bc423f67aeaf7971
- Major Detection Name : Ransom:MSIL/JigsawLocker.A (Microsoft), Troj/Jigsaw-P (Sophos)
- Encrypted File Pattern : .LOCKED_BY_pablukl0cker
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\OfficeUpdate
- C:\Users\%UserName%\AppData\Local\OfficeUpdate\svchost.exe
- C:\Users\%UserName%\AppData\Roaming\.Microsoft
- C:\Users\%UserName%\AppData\Roaming\.Microsoft\Address.txt
- C:\Users\%UserName%\AppData\Roaming\.Microsoft\dr
- C:\Users\%UserName%\AppData\Roaming\.Microsoft\EncryptedFileList.txt
- C:\Users\%UserName%\AppData\Roaming\GoogleChromeUpdate
- C:\Users\%UserName%\AppData\Roaming\GoogleChromeUpdate\msconfig.exe
- Major Characteristics :
- Offline Encryption
- Ramsey Ransomware series
- Create a fake ".NET Framework Initialization Error" message
- Automatically delete encrypted files every hour
List