- Distribution Method : Unknown
- MD5 : 2dc218b43cb13de278f4f068c503a6e3
- Major Detection Name : Ransom:Win32/VegaLock (Microsoft), Ransom.Win32.JAMPER.THCBAAI (Trend Micro)
- Encrypted File Pattern : .jamper
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\Firewall and Security.{4026492F-2F69-46B8-B9BF-5654FC07E423}
- C:\Users\%UserName%\AppData\Roaming\Firewall and Security.{4026492F-2F69-46B8-B9BF-5654FC07E423}\defender.exe
- Payment Instruction File : ---README---.TXT
- Major Characteristics :
- Offline Encryption
- Buran / VegaLocker Ransomware series
- Disable system restore (bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no, wbadmin delete catalog -quiet, wbadmin delete systemstatebackup, wbadmin delete systemstatebackup -keepversions:0, wbadmin delete backup, wmic shadowcopy delete, vssadmin delete shadows /all /quiet)
List