- Distribution Method : Unknown
- MD5 : 678af4b6a7cf159209e3d469032637a4
- Major Detection Name : Ransom-Matrix (McAfee), Ransom_MATRIX.A (Trend Micro)
- Encrypted File Pattern : <Random>.MTH → <Random>.id-<Random>.MATRIX
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\gnupg
- C:\Users\%UserName%\AppData\Roaming\gnupg\pubring.bak
- C:\Users\%UserName%\AppData\Roaming\gnupg\pubring.gpg
- C:\Users\%UserName%\AppData\Roaming\gnupg\pubring.gpg.lock
- C:\Users\%UserName%\AppData\Roaming\gnupg\random_seed
- C:\Users\%UserName%\AppData\Roaming\gnupg\secring.gpg
- C:\Users\%UserName%\AppData\Roaming\gnupg\secring.gpg.lock
- C:\Users\%UserName%\AppData\Roaming\gnupg\trustdb.gpg
- C:\Users\%UserName%\AppData\Roaming\gnupg\trustdb.gpg.lock
- C:\Users\%UserName%\AppData\Roaming\Microsoft\<Random>.cmd
- C:\Users\%UserName%\AppData\Roaming\Microsoft\<Random>.vbs
- Payment Instruction File : <Number>-matrix-readme.rtf / matrix-readme.rtf
- Major Characteristics :
- Offline Encryption
- The English and Russian users targeted.
- Disable system restore (vssadmin.exe delete shadows /all /Quiet)
- Interrupt file recovery using "C:\Windows\System32\cmd.exe" cipher /w:<Drive Letter>
List