- Distribution Method : Unknown
- MD5 : 7a7a36a6e76cb6e6402b83610630c73d
- Major Detection Name : Ransom:Win32/Sorikrypt.A (Microsoft), Ransom_Sorikrypt.R0EDC0DAU17 (Trend Micro)
- Encrypted File Pattern : .CryptoLocker2015breakingBadPAY
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\L459lSC67616EVw.exe
- C:\Users\%UserName%\AppData\Local\Temp\setup.exe
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW TO DECRYPT FILES.txt
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.pif
- Payment Instruction File : HOW TO DECRYPT FILES.txt
- Major Characteristics : Offline Encryption, AutoIt-based Ransomware, Changes desktop background(C:\Users\%UserName%\AppData\Local\Temp\ikjlmoabdfgikmnp.bmp)
List