- Distribution Method : Unknown
- MD5 : e10713a4a5f635767dcd54d609bed977
- Major Detection Name : Trojan/Win32.BabukRansom.C4287644 (AhnLab V3), Ransom.BabushkaLocker (Malwarebytes)
- Encrypted File Pattern : .__NIST_K571__
- Malicious File Creation Location : C:\Users\%UserName%\AppData\Roaming\ecdh_pub_k.bin
- Payment Instruction File : How To Restore Your Files.txt
- Major Characteristics :
- Offline Encryption
- Recovery Partition (M:\) + EFI System Partition (N:\) drives are activate.
- Block processes execution (agntsvc.exe, dbsnmp.exe, encsvc.exe, mydesktopservice.exe, oracle.exe, sql.exe etc.)
- Stop multi services (BackupExecVSSProvider, QBFCService, PDVFSService, sophos, VeeamTransportSvc, YooBackup etc.)
- Disable system restore (vssadmin.exe delete shadows /all /quiet)
List