- Distribution Method : Unknown
- MD5 : f5f2f6c370db4b38bdf8032ea3ef2a64
- Major Detection Name : a variant of Win64/Filecoder.O (ESET), Ransom_NOWORI.THDOCAH (Trend Micro)
- Encrypted File Pattern : .wog@onionmail.info-<16-Digit Random>
- Malicious File Creation Location : C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dont_Worry.txt
- Payment Instruction File : Dont_Worry.txt
- Major Characteristics :
- Offline Encryption
- Crypto_Lab Ransomware series
- The Russian users targeted
List