Operations of Razr ransomware commence with unique machine ID, encryption key, and Initialization Vector generation, which are later delivered in unencrypted JSON format to a command-and-control server.
Article Link: Novel Razr ransomware distributed via PythonAnywhere exploitation | SC Media