- Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
- MD5 : 4094229ca4182de4331a9e951c95fadd
- Major Detection Name : Ransom:Win32/Phobos.PA!MTB (Microsoft), Ransom.Win32.MAKOP.A (Trend Micro)
- Encrypted File Pattern : .[<Random>].[makop@airmail.cc].makop
- Malicious File Creation Location : C:\Users\%UserName%\Desktop\readme-warning.txt
- Payment Instruction File : readme-warning.txt
- Major Characteristics :
- Offline Encryption
- Block processes execution (agntsvc.exe, msaccess.exe, mysqld.exe, ocssd.exe, powerpnt.exe, thunderbird.exe etc.)
- Disable system restore (vssadmin delete shadows /all /quiet, wmic shadowcopy delete, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no, wbadmin delete catalog -quiet)
List