- Distribution Method : Unknown
- MD5 : 0f522d0f0001c8985df5e81b4d9a9398
- Major Detection Name : Ransom:MSIL/Judge!MSR (Microsoft), Ransom.MSIL.JUDGE.A (Trend Micro)
- Encrypted File Pattern : .[judgemebackup@tutanota.com].judge
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%Namee%
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vYtzIm0SDgeCYX5eq8g7.exe
- Payment Instruction File : info.txt
- Major Characteristics :
- Offline Encryption
- NoCry Ransomware series
- Changes desktop background (C:\Users\%UserName%\AppData\Local\Temp\Cry.img)
List