- Distribution Method : Unknown
- MD5 : c708778419967ff6eea72e8ec7c412cf
- Major Detection Name : Trojan.Ransom.Makop (ALYac), TR/AD.PhobosRansom.poqsb (Avira)
- Encrypted File Pattern : .[<Random>].makop
- Malicious File Creation Location :
- C:\ProgramData\ErrorResponder
- C:\ProgramData\ErrorResponder\<Random>.exe
- <Drive Letter>:\YOUR_FILES_ARE_ENCRYPTED
- <Drive Letter>:\YOUR_FILES_ARE_ENCRYPTED\readme-warning.txt
- Payment Instruction File : readme-warning.txt
- Major Characteristics :
- Offline Encryption
- Delete multi services (MSSQL, MSSQLFDLauncher, SQLSERVERAGENT, SSISTELEMETRY130, storflt, vmickvpexchange etc.)
- Block processes execution (fdlauncher.exe, MsDtsSrvr.exe, sqlbrowser.exe, sqlservr.exe, sqlwriter.exe, TeamViewer.exe etc.)
- Disable system restore (vssadmin.exe Delete Shadows /All /Quiet)
List