- Distribution Method : Unknown
 
 - MD5 : 568db4e58977f0795730755b16c80b07
 
 - Major Detection Name : TR/Ransom.Xorist.EJ (Avira), Trj/RansomXor.A (Panda)
 
 - Encrypted File Pattern : .ZuCaNo
 
 - Malicious File Creation Location :
 - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\HOW TO DECRYPT FILES.txt
 - C:\Users\%UserName%\AppData\Local\Temp\yd0N5k3r1TF75n3.exe
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW TO DECRYPT FILES.txt 
 - Payment Instruction File : HOW TO DECRYPT FILES.txt
 
 - Major Characteristics :
 - Offline Encryption
 - Boom / Xorist-Frozen Ransomware series
 - When the encrypted file (.ZuCaNo) icon is changed (HKEY_CLASSES_ROOT\ESDKZKDTQDWHAGF) and the ransomware file (%Temp%\yd0N5k3r1TF75n3.exe) is executed.
 - Changes desktop background (C:\Users\%UserName%\AppData\Local\Temp\<Random>.bmp) 
 
					List