The ransomware program makes an attempt to realize elevated privileges utilizing recognized methods for PowerShell scripts, then proceeds to disable Home windows Defender real-time safety service, safety occasion logging on the system, and software occasion logging, take away restrictions positioned on PowerShell execution, and eventually delete quantity shadow copies to forestall system restore.
The malware program then makes an attempt to kill a protracted listing of processes related to quite a lot of applications, together with browsers, video gamers, messaging functions, and Home windows providers. This ensures that entry to probably vital information that may subsequently be encrypted shouldn’t be locked by these functions.
Malware spreads throughout all drives and subdirectories
The ransomware will then iterate over all drive letters and recurse by way of all subdirectories, encrypting all information with a listing of focused extensions. The file encryption routine makes use of the ChaCha20 algorithm with ephemeral keys. Encrypted information have the .funksec extension connected to them.