- Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
- MD5 : 9bb77e8d3a873c42a7f64663a219b6a6
- Major Detection Name : Gen:Variant.Ransom.LockCrypt.7 (BitDefender), Ransom:Win32/Phobos.PB!MTB (Microsoft)
- Encrypted File Pattern : .[<Random>].[luntik2316@protonmail.com].makop
- Malicious File Creation Location : C:\Users\%UserName%\Desktop\readme-warning.txt
- Payment Instruction File : readme-warning.txt
- Major Characteristics :
- Offline Encryption
- Disable system restore (vssadmin delete shadows /all /quiet, wmic shadowcopy delete, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no, wbadmin delete catalog -quiet)
List