- Distribution Method : Unknown
- MD5 : 56eaf78d4d6d8008abca1dea501062ef
- Major Detection Name : Malware/Win32.Ransom_matrix.C1862656 (AhnLab V3), Ransom_MATRIX.B (Trend Micro)
- Encrypted File Pattern : .<Random>.matrix
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Microsoft\<Random>.exe
- C:\Users\%UserName%\AppData\Local\Temp\<Random>.exe
- C:\Users\%UserName%\AppData\Roaming\Microsoft\<Random>.cmd
- C:\Users\%UserName%\AppData\Roaming\Microsoft\<Random>.exe
- C:\Users\%UserName%\AppData\Roaming\<Random>
- C:\Users\%UserName%\AppData\Roaming\<Random>\<Random>.cmd
- C:\Users\%UserName%\AppData\Roaming\<Random>\<Random>.exe
- C:\Users\%UserName%\AppData\Roaming\<Random>.hta
- Payment Instruction File : <Random>.hta / Readme-Matrix.rtf / Readme-Matrix1.rtf ~ Readme-Matrix20.rtf
- Major Characteristics :
- Offline Encryption
- Change the default values of the registry entry "HKEY_CLASSES_ROOT\mscfile\shell\open\command" and a ransomware execution using Event Viewer (eventvwr.exe)
- Disable system restore (vssadmin.exe delete shadows /all /quiet)
List