- Distribution Method : Unknown
- MD5 : 808182340fb1b0b0b301c998e855a7c8
- Major Detection Name : Trojan.Ransom.WannaCryptor (ALYac), Ransom.Wannacry (Norton)
- Encrypted File Pattern : .WCRYT → .WCRY
- Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Roaming\tor
 - \\TaskHost
 - \\TaskHost\Data
 - \\TaskHost\Data\tor
 - \\TaskHost\Tor
 - \\TaskHost\Tor\taskhosts.exe
 - \\TaskHost\Tor\tor.exe
 - \\TaskHost\Tor\tor-gencert.exe
 - \\!Please Read Me!.txt
 - \\!WannaDecryptor!.exe
 - \\!WannaDecryptor!.exe.lnk
 - \\00000000.eky
 - \\00000000.pky
 - \\00000000.res
 - \\b.wry
 - \\c.wry
 - \\m.wry
 - \\r.wry
 - \\t.wry
 - \\u.wry
- Payment Instruction File : !Please Read Me!.txt
- Major Characteristics :
 - Offline Encryption
 - The original file is moved to the temporary folder(%Temp%) or recycle bin(D:\$RECYCLER) in the <number>.WCRYT form
 - Encrypt files after certain processes terminate (taskkill /f /im MSExchange*, taskkill /f /im sqlserver.exe, taskkill /f /im sqlwriter.exe, taskkill /f /im Microsoft.Exchange.*)
 - System Restore disabled("C:\Windows\SysWOW64\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet)
 - Changes desktop background(C:\Users\%UserName%\Desktop\!WannaCryptor!.bmp)
List