- Distribution Method : Unknown
 
 - MD5 : cd0f7f29e337f2ebe455ba4a85fb2b70
 
 - Major Detection Name : Trojan.Ransom.HiddenTear (ALYac), Ransom_GHOST.THAAAIAH (Trend Micro)
 
 - Encrypted File Pattern : .Ghost
 
 - Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Roaming\Ghost
 - C:\Users\%UserName%\AppData\Roaming\Ghost\Ghost.bat
 - C:\Users\%UserName%\AppData\Roaming\Ghost\GhostHammer.dll
 - C:\Users\%UserName%\AppData\Roaming\Ghost\GhostService.exe
 - C:\Users\%UserName%\AppData\Roaming\Ghost\GhostService.exe.config
 - C:\Users\%UserName%\AppData\Roaming\Ghost\GhostService.pdb
 - C:\Users\%UserName%\AppData\Roaming\Ghost\GhostService.vshost.exe
 - C:\Do_Not_Delete_codeId.txt
 - C:\GhostFile.dll
 - C:\GhostForm.exe
 - C:\GhostHammer.dll 
 - Major Characteristics :
 - Offline Encryption
 - Hidden-Tear Open Source based Ransomware
 - Stop the MSSQLSERVER services
 - Automatically executes GhostService (%AppData%\Ghost\GhostService.exe) every 2 minutes. 
 
					List