- Distribution Method : Unknown
- MD5 : 6478ba983b659f00466da5dd61bf9768
- Major Detection Name : Ransomware/Win.TAIHENCHAN.C4534360 (AhnLab V3), W64/Donut.VF!tr.ransom (Fortinet)
- Encrypted File Pattern : .docm
- Payment Instruction File : readmerecovery.txt
- Major Characteristics :
- Offline Encryption
- Use a "Microsoft Windows" Digital Signatures
- Disable and Blocks Task Manager (Taskmgr.exe)
- Block processes execution (dnSpyx64.exe, joeboxcontrol.exe, pe-sieve64.exe, procexp32.exe, sysAnalyzer.exe, wireshark.exe etc.)
- Deletes event log (wevtutil.exe cl "Analytic", wevtutil.exe cl "Application", wevtutil.exe cl "DebugChannel", wevtutil.exe cl "DirectShowFilterGraph", wevtutil.exe cl "DirectShowPluginControl", wevtutil.exe cl "Els_Hyphenation/Analytic" etc.)
- Disable system restore (wbadmin delete catalog -quiet, wbadmin DELETE SYSTEMSTATEBACKUP, wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest, wmic SHADOWCOPY delete, vssadmin Delete Shadows /all /quiet, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled No, vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=401MB, vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=unbounded)
- Changes desktop background (C:\Windows\System32\spool\drivers\color\meme.jpg)
List