- Distribution Method : Mail attachment (.wsf)
- MD5 : e80c5368fa4395655be9a4ed9a6cfcc3
- Major Detection Name : Ransom:Win32/SyncCrypt.A (Microsoft), Ransom_SYNCRYPT.A (Trend Micro)
- Encrypted File Pattern : .kk
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\BackupClient
- C:\Users\%UserName%\AppData\Local\Temp\BackupClient\readme.html
- C:\Users\%UserName%\AppData\Local\Temp\BackupClient\readme.png
- C:\Users\%UserName%\AppData\Local\Temp\BackupClient\sync.exe
- C:\Users\%UserName%\AppData\Local\Temp\BackupClient\tmp.bat
- C:\Users\%UserName%\AppData\Local\Temp\DJeM9kE4.jpg
- C:\Users\%UserName%\AppData\Local\Temp\DJeM9kE4.zip
- C:\Users\%UserName%\Desktop\README
- C:\Users\%UserName%\Desktop\README\AMMOUNT.txt
- C:\Users\%UserName%\Desktop\README\KEY
- C:\Users\%UserName%\Desktop\README\readme.html
- C:\Users\%UserName%\Desktop\README\readme.png
- C:\Windows\System32\Tasks\sync
- Payment Instruction File : readme.html / readme.png
- Major Characteristics :
- Offline Encryption
- Create a fake "Windows Script Host" message
- Changes desktop background
List