- Distribution Method : Remote access through Remote Desktop Protocol(RDP) or Terminal Services
- MD5 : f322dd9886fbd09f430c25cdb6a1a9c3
- Encrypted File Pattern : .[<Random>].[mkplocker@tutanota.com].mkp
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\+README-WARNING+.txt
- <Drive Letter>:\YOUR_FILES_ARE_ENCRYPTED
- <Drive Letter>:\YOUR_FILES_ARE_ENCRYPTED\+README-WARNING+.txt
- Payment Instruction File : +README-WARNING+.txt
- Major Characteristics :
- Offline Encryption
- Block processes execution (chrome.exe, dbsnmp.exe, fdhost.exe, HPScan.exe, outlook.exe, pg_ctl.exe etc.)
- Disable system restore (vssadmin delete shadows /all /quiet, wbadmin delete catalog -quiet, wmic shadowcopy delete)
- Changes desktop background (C:\Users\%UserName%\AppData\Local\Temp\<Random>.tmp.bmp)
List