- Distribution Method : Unknown
- MD5 : fcb016ec79f212cc3d3f058db3b1e2cc
- Major Detection Name : Ransom:Win32/Aurora.PI (Microsoft), Ransom_Gen.R002C0WGK19 (Trend Micro)
- Encrypted File Pattern : .veracrypt
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\@@_ATTENTION_@@.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\@@_README_@@.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\@@_RECOVERY_@@.txt
- C:\Users\%UserName%\AppData\Roaming\000000000.key
- Payment Instruction File : @@_ATTENTION_@@.txt / @@_README_@@.txt / @@_RECOVERY_@@.txt
- Major Characteristics :
- Offline Encryption
- RickRoll Locker Ransomware series
- The Russian users are targeted.
List