- Distribution Method : Unknown
- MD5 : 413770ba14b8df7a7f291aef9e1b5af1
- Major Detection Name : Ransom.Rapid (Malwarebytes), Ransom:Win32/Robinhood.AR!MTB (Microsoft)
- Encrypted File Pattern : <Random Filename>.cryptolocker
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}
- C:\Users\%UserName%\AppData\Roaming\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\norapid.exe
- C:\Users\%UserName%\AppData\Roaming\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\rapidrecovery.txt
- C:\Windows\System32\Tasks\SvcSafeData
- Payment Instruction File : !DECRYPT_FILES.txt / rapidrecovery.txt
- Major Characteristics :
- Offline Encryption
- Disable and Blocks Command Prompt (cmd.exe) and Task Manager (Taskmgr.exe)
- Delete multi services (MsDtsServer130, MSSQLFDLauncher, ReportServer, SQLSERVERAGENT, storflt, vmickvpexchange etc.)
- Block processes execution (fdlauncher.exe, msmdsrv.exe, pg_ctl.exe, ReportingServicesService.exe, sqlbrowser.exe, UniFi.exe etc.)
- Delete backup files (*.bac, *.bak, *.bkf, *.dsk, *.set, *.VHD, *.wbcat, *.win, Backup*.*)
- Disable system restore (vssadmin.exe Delete Shadows /All /Quiet, bcdedit.exe /set {default} recoveryenabled No, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures, wbadmin DELETE, SYSTEMSTATEBACKUP, wmic SHADOWCOPY DELETE, vssadmin.exe resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=401MB, vssadmin.exe resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=unbounded)
- Adds SvcSafeData to scheduler to execute "%AppData%\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\norapid.exe" every minute
- Changes desktop background (%AppData%\{A7DBD80C-410D-4C87-99F9-B19C0DA21BF1}\kakdela.bmp)
List