- Distribution Method : Automatic infection using exploit by visiting website
- MD5 : cadf470a9e34d442d74fc7572ac45cfb
- Major Detection Name : Generic.Ransom.Magniber.F8E5B4A7 (BitDefender), a variant of Win32/Filecoder.Magniber.A (ESET)
- Encrypted File Pattern : .fprgbk
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\fprgbk.exe
- C:\Users\%UserName%\Desktop\READ_ME_FOR_DECRYPT_<Random>_.txt
- C:\Users\%UserName%\Desktop\<Random>.exe
- C:\Windows\System32\Tasks\fprgbk
- C:\Windows\System32\Tasks\<Random>
- Payment Instruction File : READ_ME_FOR_DECRYPT_<Random>_.txt
- Major Characteristics :
- Offline Encryption
- Run only on Korean operating system
- Auto execute ransomware (pcalua.exe -a %Temp%\fprgbk.exe) and payment instrucition file (%Temp%\READ_ME_FOR_DECRYPT_<Random>_.txt) every 15 minutes by adding Task Scheduler entries
List