- Distribution Method : Unknown
- MD5 : 48598cd0a3461a082b8c0fa4811c6db5
- Encrypted File Pattern : .<3-Digit Random>-<3-Digit Random>-<3-Digit Random>
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\$TMP$000.exe
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\<Random>.exe
- C:\Users\%UserName%\AppData\Roaming\winupas.exe
- Payment Instruction File : !!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
- Major Characteristics :
- Offline Encryption
- Jumper / VegaLocker / Zeppelin Ransomware series
- Disable and Blocks Registry Editor (regedit.exe) and Task Manager (Taskmgr.exe)
- Block processes execution (ccleaner64.exe, firefoxconfig.exe, infopath.exe, isqlplussvc.exe, msaccess.exe, mydesktopservice.exe etc.)
List