- Distribution Method : Unknown
- MD5 : fa2bbdc9ca477ce677abaee2d408981f
- Major Detection Name : Ransom:Win32/Betisrypt.A (Microsoft), Ransom_BTCWARE.F117DQ (Trend Micro)
- Encrypted File Pattern : .[no.btc@protonmail.ch].cryptobyte
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\#_HOW_TO_FIX.inf
- C:\Users\%UserName%\AppData\Roaming\mfskSkfkls.exe
- C:\Users\USPC10\Desktop\key.dat
- Payment Instruction File : #_HOW_TO_FIX.inf
- Major Characteristics :
- Offline Encryption
- Crptxxx Ransomware series
- Changes desktop background (C:\Users\%UserName%\AppData\Roaming\1.bmp)
List