- Distribution Method : Unknown
- MD5 : a5d0477c3df63122a04819218108d806
- Major Detection Name : a variant of MSIL/Filecoder.Jigsaw.B (ESET), Ransom:MSIL/JigsawLocker.A (Microsoft)
- Encrypted File Pattern : .LOCKED_BY_pablukl0cker
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\OfficeUpdate\svchost.exe
- C:\Users\%UserName%\AppData\Roaming\GoogleChromeUpdate\msconfig.exe
- Major Characteristics :
- Offline Encryption
- The Polish users targeted
- Create a fake ".NET Framework Initialization Error" message
- Automatically delete encrypted files every hour
List