- Distribution Method : Unknown
 
 - MD5 : 69d07a8452391985937e19a106dfe531
 
 - Major Detection Name : W32/Diztakun.BKTO!tr (Fortinet), Ransom:Win32/Vigorf.A (Microsoft)
 
 - Encrypted File Pattern : (encrypted) <Original Filename>.<Original Extension>
 
 - Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Local\Temp\_MEI<Random>
 - C:\Users\%UserName%\AppData\Local\Temp\Explore.exe
 - C:\Users\%UserName%\AppData\Local\Temp\setup.bat
 - C:\Users\%UserName%\AppData\Local\Temp\start.vbs
 - C:\Users\%UserName%\AppData\Local\Temp\warning.vbs
 - C:\Windows\SoftwareDistribution\Download\windll.exe 
 - Major Characteristics :
 - Offline Encryption
 - HolyCrypt Ransomware series
 - Python-based Ransomware
 - Create a fake "archeage.exe - Application Error" message
 - Disable and Blocks Windows Run Command in Start menu (NoRun), Command Prompt (DisableCMD), Registry Editor (DisableRegistryTools) and Task Manager (DisableTaskMgr)
 - Disable system restore (vssadmin Delete Shadows /All /Quiet, bcdedit /set {default} recoveryenabled No, bcdedit /set {default} bootstatuspolicy ignoreallfailures) 
 
					List