- Distribution Method : Unknown
- MD5 : 1dd542bf3c1781df9a335f74eacc82a4
- Major Detection Name : Win32:TeslaCrypt-HH [Trj] (AVG), Ransom.CryptoWall (Malwarebytes)
- Encrypted File Pattern : .zzz
- Malicious File Creation Location :
- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\help_restore_files_<5-Digit English Small Letter Random>.html
- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\help_restore_files_<5-Digit English Small Letter Random>.txt
- C:\Users\%UserName%\AppData\Roaming\<Random>.exe
- C:\Users\%UserName%\Desktop\HELP_RESTORE_FILES.HTML
- C:\Users\%UserName%\Desktop\HELP_RESTORE_FILES.txt
- Payment Instruction File : HELP_RESTORE_FILES.HTML / HELP_RESTORE_FILES.txt / help_restore_files_<5-Digit English Small Letter Random>.html / help_restore_files_<5-Digit English Small Letter Random>.txt
- Major Characteristics :
- Offline Encryption
- Block processes execution (cmd.exe, msconfig, procexp, regedit, taskmgr)
- Disable system restore (vssadmin.exe delete shadows /all /Quiet)
List