- Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
- MD5 : 83e824c998f321a9179efc5c2cd0a118
- Major Detection Name : Ransom:Win32/Xdatrypt.A (Microsoft), Ransom_SOREBRECT.B (Trend Micro)
- Encrypted File Pattern : .aes_ni_0day
- Payment Instruction File : !!! READ THIS - IMPORTANT !!!.txt
- Major Characteristics :
- Offline Encryption
- XData Ransomware series
- File encryption using "C:\Windows\SysWOW64\svchost.exe" system file
List