- Distribution Method : Automatic infection using exploit by visiting website
 
 - MD5 : cec391cbeb54fd264ecc758eba2165c9
 
 - Major Detection Name : a variant of Win32/Kryptik.GFBW (ESET)
 
- Encrypted File Pattern : .hxzrvhh
 
 - Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Local\README.txt
     - C:\Users\Public\<Random>.exe
     - C:\Windows\System32\Tasks\<Random>
     - C:\Windows\System32\Tasks\<Random>1 
 - Payment Instrucition File : README.txt
 
 - Major Characteristics :
     - Offline Encryption
     - Only run on Korean operating system
     - Change the default values of the registry entry "HKEY_CLASSES_ROOT\mscfile\shell\open\command" and disable system restore (wmic shadowcopy delete) using Event Viewer (eventvwr.exe)
     - Auto execute payment instrucition file (pcalua.exe -a notepad.exe -c %LocalAppData%\README.txt) every 15 minutes by adding Task Scheduler entries
     - Auto connect MY DECRYPTOR site (pcalua.exe -a http://<URL>) every a hour by adding Task Scheduler entries 
 
					List