- Distribution Method : Unknown
- MD5 : f7a933ff89aa9cf353b9f303e1820573
- Major Detection Name : a variant of MSIL/Filecoder.Jigsaw.B (ESET), Ransom:MSIL/JigsawLocker.A (Microsoft)
- Encrypted File Pattern : .lckd
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Adobe (x86)\AcroRd32.exe
- C:\Users\%UserName%\AppData\Roaming\Google (x86)\Chrome32.exe
- C:\Users\%UserName%\AppData\Roaming\System32Work
- C:\Users\%UserName%\AppData\Roaming\System32Work\Address.txt
- C:\Users\%UserName%\AppData\Roaming\System32Work\dr
- C:\Users\%UserName%\AppData\Roaming\System32Work\EncryptedFileList.txt
- Major Characteristics :
- Offline Encryption
- Create a fake "Initialization Exception" message
- Automatically delete encrypted files every hour
List