- Distribution Method : Unknown
- MD5 : 6ba51efc53b743f9c4a2a119e411ed12
- Major Detection Name : Ransom:MSIL/JigsawLocker.A (Microsoft), Ransom.Jigsaw (Norton)
- Encrypted File Pattern : .lckd
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Adobe (x86)\AcroRd32.exe
- C:\Users\%UserName%\AppData\Roaming\Google (x86)\Chrome32.exe
- C:\Users\%UserName%\AppData\Roaming\System32Work
- C:\Users\%UserName%\AppData\Roaming\System32Work\Address.txt
- C:\Users\%UserName%\AppData\Roaming\System32Work\dr
- C:\Users\%UserName%\AppData\Roaming\System32Work\EncryptedFileList.txt
- Major Characteristics :
- Offline Encryption
- Create a fake "Unknown Exception" message
- Automatically delete encrypted files every hour
List