- Distribution Method : Unknown
- MD5 : 86e69065fb7db3c1b360b061ae599f54
- Major Detection Name : HEUR:Trojan-Ransom.Win32.Surtr.gen (Kaspersky), Ransom.Win32.SURTR.SMYXCCCT1 (Trend Micro)
- Encrypted File Pattern : .[Ldedata@mailfence.com].SURT
- Malicious File Creation Location :
 - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Surtr.exe
 - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\SURTR_README.hta
 - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\SURTR_README.txt
 - C:\ProgramData\Service
 - C:\ProgramData\Service\BUs.surt
 - C:\ProgramData\Service\ID_DATA.surt
 - C:\ProgramData\Service\Private_DATA.surt
 - C:\ProgramData\Service\Public_DATA.surt
 - C:\ProgramData\Service\reg.surt
 - C:\ProgramData\Service\Service.surt
 - C:\ProgramData\Service\Surtr.exe
 - C:\ProgramData\Service\SURTR_README.hta
 - C:\ProgramData\Service\SURTR_README.txt
 - C:\ProgramData\Service\SurtrIcon.ico
 - C:\Users\%UserName%\AppData\Local\Temp\Service
 - C:\Users\%UserName%\AppData\Local\Temp\Service\ID_DATA.surt
 - C:\Users\%UserName%\AppData\Local\Temp\Service\Private_DATA.surt
 - C:\Users\%UserName%\AppData\Local\Temp\Service\Public_DATA.surt
 - C:\Users\%UserName%\AppData\Local\Temp\Service\SURTR_README.hta
 - C:\Users\%UserName%\AppData\Local\Temp\Service\SURTR_README.txt
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Surtr.exe
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SURTR_README.hta
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SURTR_README.txt
 - C:\Windows\System32\Tasks\exp
 - C:\Windows\System32\Tasks\svchos1
 - C:\Windows\System32\Tasks\svchos2
- Payment Instruction File : SURTR_README.hta / SURTR_README.txt
- Major Characteristics :
 - Offline Encryption
 - Turns off User Access Control (UAC)
 - Disable Windows Defender (DisableAntiSpyware)
 - Disable and Blocks Task Manager (DisableTaskMgr)
 - Change encrypted file (.SURT) icon (HKEY_CLASSES_ROOT\.surt)
 - Adds svchos1 and svchos2 to scheduler to execute "C:\ProgramData\Service\Surtr.exe" at user login.
 - Adds exp to scheduler to execute "C:\Windows\explorer.exe" at user login.
 - Stop services execution (Acronis VSS Provider, Enterprise Client Service, Sophos Agent, Sophos AutoUpdate Service, SQLsafe Backup Service, Symantec System Recovery etc.)
 - Disable system restore (vssadmin resize shadowstorage /for=<Drive Letter>:\ /on=<Drive Letter>:\ /maxsize=401MB, vssadmin resize shadowstorage /for=<Drive Letter>:\ /on=<Drive Letter>:\ /maxsize=unbounded, vssadmin Delete Shadows /all /quiet, bcdedit /set {default} recoveryenabled No, bcdedit /set {default} bootstatuspolicy IgnoreAllFailures, reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v DisableConfig /t REG_DWORD /d 1 /f, reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v DisableSR /t REG_DWORD /d 1 /f)
 - Delete backup files (<Drive Letter>:\*.bac, <Drive Letter>:\*.bak, <Drive Letter>:\*.bkf, <Drive Letter>:\Backup*.*, <Drive Letter>:\backup*.*)
 - Deletes event log (Analytic, Application, EndpointMapper, HardwareEvents, Internet Explorer, Network Isolation Operational etc.)
 - Changes desktop background (C:\ProgramData\Service\SurtrBackGround.jpg)
リスト