- Distribution Method : Installation via Ammyy malware
- MD5 : c6d3cfd57df955f818362395a404f439
- Major Detection Name : Trojan-Ransom.Win32.KlopRansom.dy (Kaspersky), Ransom_KlopRansom.R02DC0GL919 (Trend Micro)
- Encrypted File Pattern : .CIop / .CIop2
- Malicious File Creation Location : C:\Windows\swaqp.exe
- Payment Instruction File : CIopReadMe.txt
- Major Characteristics :
- Offline Encryption
- Use an "Infoware Cloud Limited" Digital Signatures
- Encryption with .CIop2 file extension in the presence of Kaspersky process (AVP.exe, AVPSUS.exe, KAVFS.exe, KAVFSGT.exe, KAVFSWP.exe, KAVTRAY.exe, KLNAGENT.exe, VAPM.exe)
- Block processes execution (CDFSVC.EXE, CTXXMLSS.EXE, PLSQLDEV.EXE, RUN-FILESTORE.EXE, SQLAGENT.EXE, SQLSERVR.EXE etc.)
List