- Distribution Method : Unknown
- MD5 : 3c03b58f0c7263be50c6c91d2e582562
- Major Detection Name : Generic.MSIL.Ransomware.Jigsaw.E80780D9 (BitDefender), Ransom.Jigsaw.Generic (Malwarebytes)
- Encrypted File Pattern : .##___POLICJA!!!___TEN_PLIK_ZOSTAŁ_ZABLOKOWANY!!!___
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Microsoft Office
- C:\Users\%UserName%\AppData\Local\Microsoft Office\Activation Settings
- C:\Users\%UserName%\AppData\Local\Microsoft Office\Activation Settings\dllhost.exe
- C:\Users\%UserName%\AppData\Roaming\Adobe Reader
- C:\Users\%UserName%\AppData\Roaming\Adobe Reader\svchost.exe
- C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)
- C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)\BTC__ADDRESS.txt
- C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)\dr
- C:\Users\%UserName%\AppData\Roaming\ProgramFiles(x86)\EncryptedFileList.txt
- Major Characteristics :
- Offline Encryption
- Ramsey Ransomware series
- The Polish users are targeted.
- Create a fake ".NET Framework Initialization Error" message
- Automatically delete encrypted files every hour
List