- Distribution Method : Installation via AZORult malware
 
 - MD5 : 2409c058a86cd8743abb10a5735ef487
 
 - Major Detection Name : a variant of Win32/Kryptik.GIZG (ESET), Mal/GandCrab-B (Sophos)
 
 - Encrypted File Pattern : .Aurora
 
 - Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Roaming\1337\AU3_EXE_2018-07-18_23-01.exe
 - C:\Users\%UserName%\AppData\Roaming\1337\Ransom_2018-07-18_23-06.exe
 - C:\Users\%UserName%\AppData\Roaming\1337\wall.i
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!-GET_MY_FILES-!.txt
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#RECOVERY-PC#.txt
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\@_RESTORE-FILES_@.txt 
 - Payment Instruction File : !-GET_MY_FILES-!.txt / #RECOVERY-PC#.txt / @_RESTORE-FILES_@.txt
 
 - Major Characteristics : Changes desktop background (wall.i)
 
 
					リスト