- Distribution Method : Unknown
- MD5 : 042a6755ed9e76bd08ea0ab90cea9598
- Major Detection Name : Ransom:MSIL/Ryzerlo.A (Microsoft), Ransom_CRYPTEAR.SM0 (Trend Micro)
- Encrypted File Pattern : .rogue
- Malicious File Creation Location :
- C:\%UserName%
- C:\%UserName%\Rand123
- C:\%UserName%\Rand123\local.exe
- Payment Instruction File : READ_IT.txt
- Major Characteristics :
- Offline Encryption
- AnonCrack / Balbaz / Brazilian / CryBrazil / Cryp70n1c Army / Curumim / CyberPolice / EyLamo / Jhash / Magic / OpsVenezuela / Skull HT / Technicy Ransomware series
- Hidden-Tear Open Source based Ransomware
- Changes desktop background (C:\%UserName%\ransom.jpg)
List