- Distribution Method : Mail attachment
- MD5 : b770d9ce4ed80da3135c050054763e65
- Major Detection Name : Ransom:Win32/Betisrypt.C!bit (Microsoft), Ransom_BTCWARE.O (Trend Micro)
- Encrypted File Pattern : .[decryptyourfileshereee1@cock.li].aleta
- Malicious File Creation Location : C:\Users\%UserName%\AppData\Roaming\Info.hta
- Payment Instruction File : !#_READ_ME_#!.hta / Info.hta
- Major Characteristics :
- Offline Encryption
- Crptxxx / Gryphon / Master Ransomware series
- Use a valid "DEMUS, OOO" Digital Signatures
- Disable system restore (vssadmin.exe Delete Shadows /All /Quiet, bcdedit.exe /set {default} recoveryenabled No, bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures)
List