Home / malwarePDF  

Trojan.Cryptolocker.H


First posted on 21 August 2014.
Source: Symantec

Aliases :

There are no other names known for Trojan.Cryptolocker.H.

Explanation :

Once executed, the Trojan creates the following file:
%Windir%\[RANDOM FILE NAME].exe

The Trojan then creates the following registry entry so that it runs every time Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"[RANDOM NAME]" = "%Windir%\[RANDOM FILE NAME].exe"

It also creates the following registry entries:
HKEY_CURRENT_USER\Software\Bit Torrent Application\Configuration\"00000000" = "[BINARY DATA]"HKEY_CURRENT_USER\Software\Bit Torrent Application\Configuration\"01000000" = "[BINARY DATA]"HKEY_CURRENT_USER\Software\Bit Torrent Application\Configuration\"02000000" = "[BINARY DATA]"HKEY_CURRENT_USER\Software\Bit Torrent Application\Configuration\"03000000" = "[BINARY DATA]"
Next, the Trojan encrypts data files on the compromised computer.

Note: Encrypted files are given are given a ".encrypted" extension.

The Trojan may then display a ransom message with instructions on how to decrypt the encrypted files.

The Trojan may also gather the following information from Microsoft's Outlook, Outlook Express, or Mozilla's Thunderbird email clients installed on the compromised computer:
PasswordsEmail addresses
The Trojan sends the information gathered to the following remote location:
[http://]decryptionguru.com/gate[REMOVED]

Last update 21 August 2014

 

TOP