Threat Database Trojans Trojan.Cryptolocker.F

Trojan.Cryptolocker.F

By GoldSparrow in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 2
First Seen: June 5, 2014
Last Seen: June 12, 2019
OS(es) Affected: Windows

Trojan.Cryptolocker.F is a threat that encrypts the victims' files and then demands payment for a ransom in order to decrypt those files. Trojan.Cryptolocker.F is a form of threat and is just one out of dozens of variants on the same basic strategy. The tactic associated with this Trojan.Cryptolocker.F variant specifically targets computers in Australia by sending out threatening email messages that are disguised as energy bills from an important energy company in Australia.

Trojan.Cryptolocker.F Encrypts the PC User’s Documents

Trojan.Cryptolocker.F enters a computer through a threatening file attachment or embedded link contained in spam email. Once Trojan.Cryptolocker.F is installed, Trojan.Cryptolocker.F encrypts documents on the PC user's computer, specifically searching out for sensitive data in order to cause damage. Trojan.Cryptolocker.F also drops text and HTML files with the following wording:

!!! YOUR SYSTEM IS HACKED !!! All your files was encrypted with Cryptolocker! This means that without the decryption key the recovery of your files is not possible, If your files have a value to you and you are willing to pay me for the decryption key please contact me: decrypt-request@mail.ua You have 3 days to pay for my services. After this period, you will lose all your files. Anti-virus software can remove Cryptolocker, but can not decrypt your fles. The only way to recover your files -is to pay for the decryption key. Information for IT-specialist: Data was encrypted with AES (Rijndael) algorithm with the session key length if 256 bits. Session key is encrypted with RSA (2048 bits) algorithm. Public-key is enclosed into Cryptolocker. Private-key for decryption of the session key is stored only in my database. To crack this key, you will need more than a million years time.

These messages threaten computer users, claiming that it is necessary to pay in order to decrypt the encrypted data. The threatening email message associated with Trojan.Cryptolocker.F uses very convincing text and logos and imitates closely the normal email messages sent out by Energy Australia to customers using a spoofed email address. There are certain details in the Trojan.Cryptolocker.F email that are particularly suspicious, such as the fact that it doesn't include the addressee's name (as a normal email from the energy company would) as well as a few misspelled words and grammar mistakes. This threatening email message contains an embedded link claiming that it lets computer users 'view their bill details.' However, this link leads to a phishing page, a Web page disguised to look like a website of the energy company. There is a curious tactic here: the Trojan.Cryptolocker.F webpage includes a captcha that, once solved, claims that it is necessary to download the bill in the form of a ZIP file, which contains Trojan.Cryptolocker.F.

Registry Details

Trojan.Cryptolocker.F may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"kygxiuqw" = %Windir%\[RANDOM FILE NAME].exe
HKEY_CURRENT_USER\Software\Bit Torrent Application

Messages

The following messages associated with Trojan.Cryptolocker.F were found:

!!! YOUR SYSTEM IS HACKED !!! All your files was encrypted with Cryptolocker! This means that without the decryption key the recovery of your files is not possible, If your files have a value to you and you are willing to pay me for the decryption key please contact me: decrypt-request@mail.ua You have 3 days to pay for my services. After this period, you will lose all your files. Anti-virus software can remove Cryptolocker, but can not decrypt your fles. The only way to recover your files -is to pay for the decryption key. Information for IT-specialist: Data was encrypted with AES (Rijndael) algorithm with the session key length if 256 bits. Session key is encrypted with RSA (2048 bits) algorithm. Public-key is enclosed into Cryptolocker. Private-key for decryption of the session key is stored only in my database. To crack this key, you will need more than a million years time.

Trending

Most Viewed

Loading...