- Distribution Method : Automatic infection using exploit by visiting website
- MD5 : 789bcafdb4d2729db9e5c09e6940a3c0
- Encrypted File Pattern : .<3~9-Digit Random Extension>
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\rad<Random>.tmp.exe
- C:\CLICK_HERE-<Encryption Extension>.txt
- Payment Instruction File : CLICK_HERE-<Encryption Extension>.txt
- Major Characteristics :
- Offline Encryption
- AnteFrigus Ransomware series
- Block processes execution (aupis80.exe, avgnt.exe, dbsnmp.exe, mydesktopservice.exe, oracle.exe, sql.exe etc.)
- Disable system restore (wmic.exe shadowcopy delete)
List