- Distribution Method : Mail attachment (.wsf)
 
 - MD5 : e80c5368fa4395655be9a4ed9a6cfcc3
 
 - Major Detection Name : Ransom:Win32/SyncCrypt.A (Microsoft), Ransom_SYNCRYPT.A (Trend Micro)
 
 - Encrypted File Pattern : .kk
 
 - Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Local\Temp\BackupClient
     - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\readme.html
     - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\readme.png
     - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\sync.exe
     - C:\Users\%UserName%\AppData\Local\Temp\BackupClient\tmp.bat
     - C:\Users\%UserName%\AppData\Local\Temp\DJeM9kE4.jpg
     - C:\Users\%UserName%\AppData\Local\Temp\DJeM9kE4.zip
     - C:\Users\%UserName%\Desktop\README
     - C:\Users\%UserName%\Desktop\README\AMMOUNT.txt
     - C:\Users\%UserName%\Desktop\README\KEY
     - C:\Users\%UserName%\Desktop\README\readme.html
     - C:\Users\%UserName%\Desktop\README\readme.png
     - C:\Windows\System32\Tasks\sync 
 - Payment Instruction File : readme.html / readme.png
 
 - Major Characteristics :
     - Offline Encryption
     - Create a fake "Windows Script Host" message
     - Changes desktop background 
 
					List