- Distribution Method : Unknown
- MD5 : 7b2833549e2fc7f8f8dc7ffdd055981a
- Encrypted File Pattern : .leetenc
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\enc_test.txt
- C:\Users\%UserName%\AppData\Roaming\encrypted_files.txt
- C:\Windows\System32\Tasks\updater47
- Major Characteristics :
- Offline Encryption
- FlyBox Ransomware series
- Reruns by adding "updater47" in Task Scheduler to disable system restore (vssadmin Delete Shadows /All /Quiet)
List