- Distribution Method : Unknown
 
 - MD5 : c6f844c748dfaa9db24483c45fcfb31f
 
 - Major Detection Name : Generic.Ransom.HydraCrypt.D27F664B (BitDefender), MSIL.Trojan-Ransom.Remind.B (GData)
 
 - Encrypted File Pattern : .<4-Digit Random Extension>
 
 - Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.url
 - C:\Users\%UserName%\AppData\Roaming\Microsoft Edge.exe
 - C:\Users\%UserName%\AppData\Roaming\READ_ME.txt
 - <Drive Letter>:\Executer.exe 
 - Payment Instruction File : READ_ME.txt
 
 - Major Characteristics :
 - Offline Encryption
 - BiggyLocker / Penta Ransomware series
 - Disable system restore (vssadmin delete shadows /all /quiet, wmic shadowcopy delete, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no, wbadmin delete catalog -quiet)
 - Propagation using "<Drive Letter>:\Executer.exe" file. 
 
					List