- Distribution Method : Unknown
- MD5 : fb334f228836443b250acdab2749cad9
- Major Detection Name : Gen:Variant.Ransom.PGPSnippet.1 (BitDefender), Ransom_CYPEN.THFAAAH (Trend Micro)
- Encrypted File Pattern : .digiworldhack@tutanota_com
- Malicious File Creation Location :
- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\!!!README_DECRYPT!!!.txt
- C:\Users\%UserName%\AppData\Roaming\FrameworkLog
- C:\Users\%UserName%\AppData\Roaming\FrameworkLog\Logs.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!README_DECRYPT!!!.txt
- C:\Users\%UserName%\AppData\Roaming\host.txt
- C:\Users\%UserName%\AppData\Roaming\KBFilt.exe
- Payment Instruction File : !!!README_DECRYPT!!!.txt
- Major Characteristics : Offline Encryption
List