- Distribution Method : Unknown
- MD5 : cc701a359594f2fecbfb5aa010edb7fa
- Major Detection Name : Ransom:MSIL/BlackHeart!MTB (Microsoft), Ransom_FILESLOCKER.THAABGAH (Trend Micro)
- Encrypted File Pattern : .[fileslocker@pm.me]
- Payment Instruction File : #解密我的文件#.txt / #DECRYPT MY FILES#.txt
- Major Characteristics :
- Offline Encryption
- The Chinese and English users targeted
- Disable system restore (vssadmin.exe delete shadows /all /quiet)
- Encryption guide using Text-to-Speech (TTS) function
- Changes desktop background (C:\Users\%UserName%\Desktop\WallPaper.bmp)
List