- Distribution Method : Unknown
 
 - MD5 : 6b054c8d851cb5a91afb6a3d5bc57886
 
 - Major Detection Name : Win32:Sodinokibi-B [Ransom] (Avast), Ransom.Win32.GANDCRAB.SMILC (Trend Micro)
 
 - Encrypted File Pattern : .<5~10-Digit Random Extension>
 
 - Payment Instruction File : <Encryption Extension>-MANUAL.txt
 
 - Major Characteristics :
 - Offline Encryption
 - Impersonating GandCrab Ransomware (v5.3)
 - Disable system restore (wmic.exe shadowcopy delete)
 - Changes desktop background (C:\Users\%UserName%\AppData\Local\Temp\bxmeoengtf.bmp) 
 
					List