- Distribution Method : Unknown
 
 - MD5 : 6478ba983b659f00466da5dd61bf9768
 
 - Major Detection Name : Ransomware/Win.TAIHENCHAN.C4534360 (AhnLab V3), W64/Donut.VF!tr.ransom (Fortinet)
 
 - Encrypted File Pattern : .docm
 
 - Payment Instruction File : readmerecovery.txt
 
 - Major Characteristics :
 - Offline Encryption
 - Use a "Microsoft Windows" Digital Signatures
 - Disable and Blocks Task Manager (Taskmgr.exe)
 - Block processes execution (dnSpyx64.exe, joeboxcontrol.exe, pe-sieve64.exe, procexp32.exe, sysAnalyzer.exe, wireshark.exe etc.)
 - Deletes event log (wevtutil.exe cl "Analytic", wevtutil.exe cl "Application", wevtutil.exe cl "DebugChannel", wevtutil.exe cl "DirectShowFilterGraph", wevtutil.exe cl "DirectShowPluginControl", wevtutil.exe cl "Els_Hyphenation/Analytic" etc.)
 - Disable system restore (wbadmin delete catalog -quiet, wbadmin DELETE SYSTEMSTATEBACKUP, wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest, wmic SHADOWCOPY delete, vssadmin Delete Shadows /all /quiet, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled No, vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=401MB, vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=unbounded)
 - Changes desktop background (C:\Windows\System32\spool\drivers\color\meme.jpg) 
 
					List