- Distribution Method : Automatic infection using exploit by visiting website
- MD5 : 7c1604be09f825054ea780c985e89e0b
- Major Detection Name : Gen:Heur.Ransom.Imps.3 (BitDefender), Trojan:Win32/Wacatac.D!ml (Microsoft)
- Encrypted File Pattern : .<3~9-Digit Random Extension>
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\<Random>.exe
- C:\Users\Public\Documents\-=CLICK_ME=--<Encryption Extension>.txt
- Payment Instruction File : -=CLICK_ME=--<Encryption Extension>.txt
- Major Characteristics :
- Offline Encryption
- AnteFrigus Ransomware series
- Block processes execution (aupis80.exe, avgnt.exe, dbsnmp.exe, mydesktopservice.exe, oracle.exe, sql.exe etc.)
- Disable system restore (wmic.exe shadowcopy delete)
List