- Distribution Method : Unknown
- MD5 : a11828339f07c41bdf234317c6418b7f
- Major Detection Name : AutoIt/Ouroboros.A!tr.ransom (Fortinet), Ransom.Win32.CRYPTWIRE.THDBIAI (Trend Micro)
- Encrypted File Pattern : <Original Filename>DesktopReadme.<Original Extension>
- Malicious File Creation Location :
- C:\Program Files (x86)\Common Files\<Random>.exe
- C:\Program Files (x86)\Common Files\log.txt
- C:\Windows\System32\Tasks\<10자리 숫자>
- Payment Instruction File : INSTRUCTIONS.txt / README.txt
- Major Characteristics :
- Offline Encryption
- Lomix / Owl / UltraLocker / WanaCry4 Ransomware series
- AutoIt scripts based Ransomware
- Adds <10-Digit Number> to scheduler to execute "C:\Program Files (x86)\Common Files\<Random>.exe" at user login.
- Disable system restore (vssadmin.exe Delete Shadows /All /Quiet, bcdedit /set {default} recoveryenabled No, bcdedit /set {default} bootstatuspolicy ignoreallfailures)
List