- Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
- MD5 : 7f42264810d58c4679dc469bef0706e8
- Major Detection Name : a variant of Win32/Filecoder.GoGoogle.A (ESET), Ransom.stadyOne.GO (Malwarebytes)
- Encrypted File Pattern : .<Original Extension>_ID_<Random>_H_decrypt@files.mn.google
- Payment Instruction File : FileRecovery.txt
- Major Characteristics :
- Offline Encryption
- Stop multi services (Database, MongoDB, MSSQL, ReportServer, SQLAgent, WinDefend etc.)
- Block processes execution (avp, msftefd, mysql, node, oracle, store etc.)
- Disable system restore (WMIC.exe SHADOWCOPY DELETE, vssadmin.exe Delete Shadows /All /Quiet, bcdedit /set {default} recoveryenabled No, bcdedit /set {default} bootstatuspolicy ignoreallfailures)
List