![]() First, it encrypts the files with AES encryption using a randomly generated 32-bit key. It will enumerate through the the system drives to encrypt the files using double encryption. The malware establishes persistence by creating the follow registry key on the victim's machine:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |