- Distribution Method : Unknown
- MD5 : 7acedec21afa84177bb9ee97b0137012
- Major Detection Name : Ransom:Win32/Genasom (Microsoft), Ransom_Crypmodadv.R002C0WJ517 (Trend Micro)
- Encrypted File Pattern : .poler
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\<Random>.tmp\spwak.vbs
- C:\Users\%UserName%\AppData\Local\Tempspwak.exe
- Payment Instruction File : @Please_Read_Me@.txt
- Major Characteristics :
- Offline Encryption
- Encryption guide using Text-to-Speech (TTS) function
- Changes desktop background (%AppData%\img.jpg)
List