- Distribution Method : Automatic infection using exploit by visiting website
- MD5 : 199366017c65aafcb0a49821b7ca3ce7
- Major Detection Name : Ransom:Win32/Genasome (Microsoft), Ransom.Philadelphia (Norton)
- Encrypted File Pattern : <Random Filename>.locked
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\delph1.bin
- C:\Users\%UserName%\AppData\Local\Temp\delph1.dat
- C:\Users\%UserName%\AppData\Local\Temp\pd4ta.bin
- C:\Users\%UserName%\AppData\Local\Temp\pd4ta.dat
- C:\Users\%UserName%\AppData\Roaming\Isass.exe
- Payment Instruction File : LOCKED.txt
- Major Characteristics : Stampado Ransomware 변종, AutoIT 스크립트 기반 Ransomware, 유효하지 않은 "Kinder Lab" 디지털 서명 사용