Threat Database Ransomware CryptoLockerEU Ransomware

CryptoLockerEU Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Ranking: 7,065
Threat Level: 20 % (Normal)
Infected Computers: 1,304
First Seen: January 5, 2017
Last Seen: September 21, 2023
OS(es) Affected: Windows

The CryptoLockerEU Ransomware is a ransomware Trojan that labels itself as the CryptoLockerEU 2016. The CryptoLockerEU Ransomware encrypts its victims' files and then adds the extension '.send 0.3 BTC crypt' to the end of each file's name, making it easy to see which files have been compromised. This is one of the first cases of the CryptoLockerEU Ransomware including the ransom amount in the file extension used to mark affected files. The CryptoLockerEU Ransomware delivers its ransom note in the form of a text file that may show up as 'ĐŔŃŘČÔĐÎÂŔŇÜ ÔŔÉËŰ.txt' or as 'РАСШИФРОВАТЬ ФАЙЛЫ,' depending on whether the victim's version of Windows can display Cyrillic characters. This file's named translates as 'DECRYPT FILES.txt' and contains the CryptoLockerEU Ransomware's ransom note. Malware analysts strongly advise computer users to avoid paying the CryptoLockerEU Ransomware's ransom. Instead, the CryptoLockerEU Ransomware should be removed completely, and affected files should be restored from a backup copy. It is possible that malware analysts will release a decryption utility for the CryptoLockerEU Ransomware eventually.

How the CryptoLockerEU Ransomware may be Distributed

The most common way of distributing the CryptoLockerEU Ransomware is through corrupted email attachments. The email messages used to distribute the CryptoLockerEU Ransomware have been observed to have some of the following subject lines:

'Upgrade to Windows 10 for Free.
Claim the free iTunes tracks now.
You have lost access to your PayPal funds.
Your flight status has been confirmed.
Someone wants to add you on LinkedIn.'

The emails are designed to trick computer users into opening an attached file or clicking on an embedded link under a variety of tactics. Because of this, one of the best ways to prevent the CryptoLockerEU Ransomware and other threats is always to avoid opening unsolicited email attachments or clicking on links in these kinds of emails. A strong anti-spam filter also can prevent these corrupted email messages from reaching the victim in the First place.

Tjhe Poor Implementation of the CryptoLockerEU Ransomware

Since the CryptoLockerEU Ransomware is a relatively new threat, PC security researchers have not released a lot of information about it. However, it is likely that the people responsible for the CryptoLockerEU Ransomware attack are relatively inexperienced, since many aspects of the CryptoLockerEU Ransomware are poorly implemented, particularly its ransom note. As soon as the CryptoLockerEU Ransomware is installed, it begins encrypting the victim's files. The CryptoLockerEU Ransomware searches for the following file types during its attack, encrypting each of these files using a strong encryption algorithm:

.7z .rar .m4a .wma .avi .wmv .csv .d3dbsp .sc2save .sie .sum .ibank .t13 .t12 .qdf .gdb .tax .pkpass .bc6 .bc7 .bkp .qic .bkf .sidn .sidd .mddata .itl .itdb .icxs .hvpl .hplg .hkdb .mdbackup .syncdb .gho .cas .svg .map .wmo .itm .sb .fos .mcgame .vdf .ztmp .sis .sid .ncf .menu .layout .dmp .blob .esm .001 .vtf .dazip .fpk .mlx .kf .iwd .vpk .tor .psk .rim .w3x .fsh .ntl .arch00 .lvl .snx .cfr .ff .vpp_pc .lrf .m2 .mcmeta .vfs0 .mpqge .kdb .db0 .DayZProfile .rofl .hkx .bar .upk .das .iwi .litemod .asset .forge .ltx .bsa .apk .re4 .sav .lbf .slm .bik .epk .rgss3a .pak .big .unity3d .wotreplay .xxx .desc .py .m3u .flv .js .css .rb .png .jpeg .txt .p7c .p7b .p12 .pfx .pem .crt .cer .der .x3f .srw .pef .ptx .r3d .rw2 .rwl .raw .raf .orf .nrw .mrwref .mef .erf .kdc .dcr .cr2 .crw .bay .sr2 .srf .arw .3fr .dng .jpe .jpg .cdr .indd .ai .eps .pdf .pdd .psd .dbfv .mdf .wb2 .rtf .wpd .dxg .xf .dwg .pst .accdb .mdb .pptm .pptx .ppt .xlk .xlsb .xlsm .xlsx .xls .wps .docm .docx .doc .odb .odc .odm .odp .ods .odt.

Below is the full text of the CryptoLockerEU Ransomware's ransom note, which itself is written in English despite that the file's name is in Russian:

'CryptoLockerEU 2016 rusia
Your important liles encryption produced on this computer:photos,videos,document,etc.
Encryption was produced using a RSA-2045bit !!
To Obtime the private key for this computer, which will automatically
decrypt files, you have to send 0.3 BTC to bitcoin adres 14bPTE6DVpx8Vrzk1wt3M8XsJ5YU3ebzKo
You will receive your private key + software within 2 hours.
You have just 7 days before the private key (password) is deleted
https://www.coinbase.com/buy-bitcoin
https://cex.io/buy-bitcoins
– transfer 0.3 BTC 14bPTE6DVpx8Vrzk1wt3M8XsJ5YU3ebzKo
VIRUS ID: {CUSTOM ID}
– on add email
– we send password + software decrypt (now)
– Messengers verification emal – Payments email (bitcoin)
Send : virus id+Bitcoin payment (verification)
decryptme.files@mail.ru
europol.eurofuck@yandex.com
super.decryptme2016@yandex.com
efwerez2015@yandex.com'

URLs

CryptoLockerEU Ransomware may call the following URLs:

windowsdetector.com

Trending

Most Viewed

Loading...