- Distribution Method : Unknown
- MD5 : 24b2b324185681f8629631420eaf3961
- Major Detection Name : Ransom.Jigsaw (Norton), Ransom_JIGSAW.SMA (Trend Micro)
- Encrypted File Pattern : .Bitconnect
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Drpbx
- C:\Users\%UserName%\AppData\Local\Drpbx\drpbx.exe
- C:\Users\%UserName%\AppData\Roaming\Frfx
- C:\Users\%UserName%\AppData\Roaming\Frfx\firefox.exe
- C:\Users\%UserName%\AppData\Roaming\System32Work
- C:\Users\%UserName%\AppData\Roaming\System32Work\Address.txt
- C:\Users\%UserName%\AppData\Roaming\System32Work\dr
- C:\Users\%UserName%\AppData\Roaming\System32Work\EncryptedFileList.txt
- Major Characteristics :
- Offline Encryption
- Ramsey Ransomware series
- Create a fake ".NET Framework Initialization Error" message
List