- Distribution Method : Unknown
- MD5 : dd57632c90ca46b42d00335c42215a87
- Major Detection Name : Ransom:MSIL/Hardbit.SK!MTB (Microsoft), Ransom.Hardbit (Norton)
- Encrypted File Pattern : <Random>.[id-<Random>].[legion@tfwno.gf].hardbit3
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\sd.vbs
- C:\Users\%UserName%\AppData\Local\Temp\sd2.vbs
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Templates\hrdb.ico
- C:\Help_me_for_Decrypt.hta
- Message File : Help_me_for_Decrypt.hta / How To Restore Your Files.txt
- Major Characteristics :
- Offline Encryption
- Disable Microsoft Defender
- Stop multi services (EraserSvc11710, macmnsvc, PDVFSService, Sophos Device Control Service, SQLAgent$SYSTEM_BGC, Zoolz 2 Service etc.)
- Delete multi services (MsDtsServer130, MSSQLFDLauncher, ReportServer, storflt, TMBMServer, vmickvpexchange, VSS etc.)
- Disable system restore (vssadmin Delete Shadows /all /quiet, wbadmin delete catalog -quiet, wmic shadowcopy delete, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no)
- Change encrypted file (.hardbit3) icon (HKEY_CLASSES_ROOT\.hardbit3)
- Changes desktop background (C:\Users\%UserName%\Desktop\HARDBIT.jpg)
List