- Distribution Method : Unknown
- MD5 : ab7db5f51065b0cd7a2c269ab46dd8c4
- Major Detection Name : Generic.Ransom.Cryak.75DAEB19 (BitDefender), Trojan-Ransom.Win32.Cryakl.ant (Kaspersky)
- Encrypted File Pattern : email-newcrann@qq.com.ver-CL 1.3.1.0.id-<Random>-<M>@<D>@<Y> <H>@<M>@<S> <AM/PM><Random>@@@@@<Random>-<Random>.randomname-<Random>.<Random>.<Random>
- Malicious File Creation Location :
- C:\Program Files (x86)\AEE9-E85A
- C:\Program Files (x86)\<Random>.exe
- C:\Users\%UserName%\AppData\Local\Temp\<Random>.exe
- Payment Instruction File : README.txt
- Major Characteristics : Offline Encryption
List