- Distribution Method : Automatic infection using exploit by visiting website
 
 - MD5 : 336e08f86fffdbc7d3131cdad53c61b8 / d4829f54c127048520312aafe0c9bbaa
 
 - Encrypted File Pattern : .<Random Extension>
 
 - Malicious File Creation Location : C:\Users\Public\readme.txt
 
 - Payment Instrucition File : readme.txt
 
 - Major Characteristics :
 - Fileless-based Ransomware
 - File encryption using explorer.exe or iexplore.exe system files
 - After Encryption, launches event viewer(eventvwr.exe) which automatically connects to open website (pcalua.exe -a http://<random>.dailybe.website/<random>) and opens ransom note (pcalua.exe -a notepad.exe -c C:\Users\Public\readme.txt) 
 
					リスト