- Distribution Method : Unknown
- MD5 : da6b7ddd28dc387bcd10b180c9bdff58
- Major Detection Name : Ransom.Syrk (Malwarebytes), Ransom:MSIL/Syrk.AD (Microsoft)
- Encrypted File Pattern : .Syrk
- Malicious File Creation Location :
- C:\Users\Default\AppData\Local\Microsoft\+dp-.txt
- C:\Users\Default\AppData\Local\Microsoft\+dp-.txt
- C:\Users\Default\AppData\Local\Microsoft\-pw+.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SydneyFortniteHacks.exe
- C:\Users\%UserName%\Desktop\Readme_now.txt
- C:\Users\%UserName%\Documents\WindowsPowerShell
- C:\Users\%UserName%\Documents\WindowsPowerShell\Modules
- C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher
- C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher\Cipher.psm1
- C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher\cry.ps1
- C:\Users\Public\Documents\cgo46ea565sdfse7.exe
- C:\Users\Public\Documents\DeleteFile.exe
- C:\Users\Public\Documents\delmy.exe
- C:\Users\Public\Documents\LimeUSB_Csharp.exe
- C:\Users\Public\Documents\startSF.exe
- C:\Users\Public\Documents\SydneyFortniteHacks.exe
- Payment Instruction File : Readme_now.txt
- Major Characteristics :
- PowerShell-based Ransomware (powershell -ExecutionPolicy ByPass -File C:\Users\%UserName%\Documents\WindowsPowerShell\Modules\Cipher\cry.ps1)
- Turns off User Access Control (UAC)
- Changes Folder Option
- Disable Windows Defender (DisableAntiSpyware)
- Block processes execution (ProcessHacker, Procmon64, Taskmgr)
- USB Drive propagation using LimeUSB_Csharp.exe file.
- Changes desktop background (C:\51875.jpg)
List