- Distribution Method : Unknown
- MD5 : 6b054c8d851cb5a91afb6a3d5bc57886
- Major Detection Name : Win32:Sodinokibi-B [Ransom] (Avast), Ransom.Win32.GANDCRAB.SMILC (Trend Micro)
- Encrypted File Pattern : .<5~10-Digit Random Extension>
- Payment Instruction File : <Encryption Extension>-MANUAL.txt
- Major Characteristics :
- Offline Encryption
- Impersonating GandCrab Ransomware (v5.3)
- Disable system restore (wmic.exe shadowcopy delete)
- Changes desktop background (C:\Users\%UserName%\AppData\Local\Temp\bxmeoengtf.bmp)
List