- Distribution Method : Mail attachment
- MD5 : f683d42e98ec1dfd2e97f81eb6200803
- Major Detection Name : Generic.Ransom.GlobeImposter.233F39D9 (BitDefender), Ransom.GlobeImposter (Norton)
- Encrypted File Pattern : .zuzya
- Malicious File Creation Location : C:\Users\Public\<Random>.exe
- Payment Instruction File : how_to_back_files.html
- Major Characteristics :
- Offline Encryption
- Fake Globe / PSCrypt Ransomware series
- Disable system restore (vssadmin.exe Delete Shadows /All /Quiet)
List