- Distribution Method : Unknown
- MD5 : 54465f04a6075b8e68f272d09b243e81
- Major Detection Name : Ransom-Avest!54465F04A607 (McAfee), Trojan:MSIL/Genasom.A!MTB (Microsoft)
- Encrypted File Pattern : .ckey(<Random>).email(data1992@protonmail.com).pack14
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\officeupdate.lnk
- C:\Users\%UserName%\Documents\MyPictures
- C:\Users\%UserName%\Documents\MyPictures\details.txt
- C:\Users\%UserName%\Documents\MyPictures\office64.exe
- Payment Instruction File : !!!Readme!!!Help!!!.txt
- Major Characteristics :
- Offline Encryption
- Generate a fake Installer lock screen
- Block processes execution (1c*, EXCEL*, mstsc.exe, notepad*, WINWORD*)
List