Cryptolocker 1.0.0 Ransomware

Cryptolocker 1.0.0 Ransomware Description

The Cryptolocker 1.0.0 Ransomware is a ransomware Trojan that originated in Turkey, and was created by a programmer that is known as 'Alp.' The Cryptolocker 1.0.0 Ransomware is an upgrade of CryptoLocker, a well-known ransomware Trojan that was first observed in 2013. This ransomware Trojan was in development through the end of 2015, when its development was interrupted. Apparently, the Cryptolocker 1.0.0 Ransomware is part of an effort to return to the development of this well-known threat. The Cryptolocker 1.0.0 Ransomware uses the RSA-2048 encryption, a strong obfuscation procedure, a different packaging and interface, and an effective ransomware attack.

How the Cryptolocker 1.0.0 Ransomware may Infect a Computer

The Cryptolocker 1.0.0 Ransomware is being distributed using social engineering techniques and corrupted email attachments. The Cryptolocker 1.0.0 Ransomware project was observed on GitHub and seems to be distributed as a PDF file that claims to be a job application or other legitimate file. Once the file is opened, the Cryptolocker 1.0.0 Ransomware infects the victim's computer, encrypting files on all local hard drives, external memory devices connected to the infected computer, and directories shared on a network. The Cryptolocker 1.0.0 Ransomware will encrypt the following file types during its attack:

.odt , .ods , .odp , .odm , .odc , .odb , .doc , .docx , .docm , .wps , .xls , .xlsx , .xlsm , .xlsb , .xlk , .ppt , .pptx , .pptm , .mdb , .accdb , .pst , .dwg , .xf , .dxg , .wpd , .rtf , .wb2 , .mdf , .dbf , .psd , .pdd , .pdf , .eps , .ai , .indd , .cdr , .jpg , .jpe , .dng , .3fr , .arw , .srf , .sr2 , .bay , .crw , .cr2 , .dcr , .kdc , .erf , .mef , .mrwref , .nrw , .orf , .raf , .raw , .rwl , .rw2 , .r3d , .ptx , .pef , .srw , .x3f , .der , .cer , .crt , .pem , .pfx , .p12 , .p7b , .p7c , .c , .cpp , .txt , .jpeg , .png , .gif , .mp3 , .html , .css , .js , .sql , .mp4 , .flv , .m3u , .py , .desc , .con , .htm , .bin , .wotreplay , .unity3d , .big , .pak , .rgss3a , .epk , .bik , .slm , .lbf , .sav , .lng , .ttarch2 , .mpq , .re4 , .apk , .bsa , .cab , .ltx , .forge , .asset , .litemod , .iwi , .das , .upk , .bar , .hkx , .rofl , .DayZProfile , .db0 , .mpqge , .vfs0 , .mcmeta , .m2 , .lrf , .vpp_pc , .ff , .cfr , .snx , .lvl , .arch00 , .ntl , .fsh , .w3x , .rim ,psk , .tor , .vpk , .iwd , .kf , .mlx , .fpk , .zip , .vtf , .001 , .esm , .blob , .dmp , .layout , .menu , .ncf , .sid , .sis , .ztmp , .vdf , .mcgame , .fos , .sb , .im , .wmo , .itm , .map , .wmo , .sb , .svg , .cas , .gho , .iso , .rar , .syncdb , .mdbackup , .hkdb , .hplg , .hvpl , .icxs , .itdb , .itl , .mddata , .sidd , .sidn , .bkf , .qic , .bkp , .bc7 , .bc6 , .pkpass , .tax , .gdb , .qdf , .t12 , .t13 , .ibank , .sum , .sie , .sc2save , .d3dbsp , .wmv , .avi , .wma , .m4a , .7z , .torrent , .csv , .cs , .jar , .java , .class.

The files that have been encrypted using the Cryptolocker 1.0.0 Ransomware Trojan will have the comment 'LOCKED File' added to the file's properties. The names and extensions of the affected files will remain the same, but their icon will become the icon for the default Text Editor. The Cryptolocker 1.0.0 Ransomware uses a ransom note that is displayed in a pop-up window that uses red and blue coloring and is named the Cryptolocker 1.0.0 Ransomware. The Cryptolocker 1.0.0 Ransomware ransom note contains the following text (originally in Turkish):

'Personal files
Photos and important files on the computer, videos, Documents, etc. were encrypted with a unique RSA-2048 key
RED [BUTTON]
- If you choose the RED, there are no copies. Goodbye to everything you have! We will delete your files.
Blue [BUTTON]
- If you take BLUE the story is better. I have the KEY with me. You can get rid of the Trojan and sleep comfortably.
Send me an email with the "Send Mail" button and save your files.
SEND MaiL'

Clicking on the RED button will delete all the encrypted files so that caution is paramount.

Dealing with the Cryptolocker 1.0.0 Ransomware

If your computer is infected with the Cryptolocker 1.0.0 Ransomware, ignore the ransom note and refrain from paying the Cryptolocker 1.0.0 Ransomware ransom. Instead, PC security researchers advise computer users to restore their files from a backup copy. Future infections also can be prevented with the help of a reliable, fully updated anti-malware application.

Aliases: Win32/Trojan.33a, Inject2.BWZN [AVG], W32/Bitman.FO!tr [Fortinet], Trojan.Win32.Injector [Ikarus], Trojan.Win32.Qudamah.Gen.2, a variant of Win32/Injector.BXSI, Trojan.Win32.Ransom.fo, Artemis!E78654D43FCF [McAfee], Ransom:Win32/Tescrypt.A [Microsoft], Trojan[Ransom]/Win32.Bitman [Antiy-AVL], TR/Injector.502272.6, Trojan/Bitman.w, Troj/Ransom-AST [Sophos], Trojan.AVKill.36611 [DrWeb] and TrojWare.Win32.Ransom.Bitman.~NS [Comodo].

Technical Information

File System Details

Cryptolocker 1.0.0 Ransomware creates the following file(s):
# File Name Size MD5 Detection Count
1 %APPDATA%\Microsoft\Crypto\sysgop.exe 276,883 3c282af747b4f70340dca3170d55ae29 247
2 %APPDATA%\Microsoft\Crypto\sysjar.exe 404,513 eb2cde846127106689d14afe7911bcec 150
3 %APPDATA%\Microsoft\Crypto\syspoz.exe 237,400 1b21b27589ddc173ba795213e108a096 38
4 %APPDATA%\Microsoft\Crypto\sysras.exe 220,726 881f86bf4bb4b9f0e993b2853a0a27cf 36
5 7F9C454A2E016E533E181D53EBA113BC 846,848 7f9c454a2e016e533e181d53eba113bc 14
6 %USERPROFILE%\??? ?????????\Downloads\Резюме.doc.exe 493,568 12303bbfe7194fd4f0070cd4d1005209 8
7 КЫРГЫЗ РЕСПУБЛИКАСЫ сейчас КЫРГЫЗСКАЯ РЕСПУБЛИКА.docx.exe 545,454 acf9873c86e35b9bee0db158befe8163 7
8 %USERPROFILE%\Desktop\????? ?????\план части.docx.exe 305,099 bac4daf1ba563a5fdd01691441cedc9b 6
9 04fb36199787f2e3e2135611a38321eb 346,112 04fb36199787f2e3e2135611a38321eb 4
10 829DDE7015C32D7D77D8128665390DAB 257,024 829dde7015c32d7d77d8128665390dab 4
11 %USERPROFILE%\Desktop\????????????????\сопроводительное в прокуратуру.docx.exe 469,286 b51d416995590c6a35a0602cfd2df94d 2
12 %USERPROFILE%\??? ?????????\Downloads\Министерство образования и науки Кыргызской Республики.docx.exe 482,132 a686e81153a11ea2817ecf58a9b0b25d 1
13 %USERPROFILE%\??????? ????\???\ready\Министерство образования и науки Кыргызской Республики1.docx.exe 485,504 5bcb809524857f26a89ac67ffc80f6f5 1
14 %ALLUSERSPROFILE%\{841eeb9e-7320-6fb8-841e-eeb9e732ae79}\PROGRAMPEMBELAJARANKELAS4.docx.exe 846,848 7c87cdad5223b0ac9e1a5e2e5cc0d20f 1
15 K:\ADC\رزمايش.docx.exe 3,269,675 64cc41e5aa1d5b34e6c49cbd9ffe9233 1
16 %USERPROFILE%\??????? ????\Davlyatbegim\Testing Draft 2.docx.exe 477,633 9406c8ea0f180383d3a8d5fedb105bb1 1
17 %ALLUSERSPROFILE%\{b36913b9-12df-03f6-b369-913b912d4ee4}\3.DAFTAR-LAMPIRAN--wahabkhoter.blogspot.com.docx.exe 465,408 85242fee40a9a0bc3ce6c20f52050643 1
18 %ALLUSERSPROFILE%\{5e5b8694-f299-3322-5e5b-b8694f291a53}\RPPTematikBerkarakterKelas1SDPengalamansms1.docx.exe 1,063,936 14434f09c026e189161254a3230523e9 1
19 F:Списывание.docx.exe 296,059 b870f4a3f292452971628fcb54d9067e 1
20 D:\???????? Opera\onenetdc++.docx.exe 9,972,789 b8ebbc2a6001ff318e49e0ec679c185f 1
21 D:\?? ???????\Downloads\scoped_dir_5156_15540\Инструкция как скачать чит и ссылка на него.docx.exe 6,561,624 860bfffc08296bd13d43bef865b33f76 1
22 %USERPROFILE%\Desktop\Тесты по модулю Пищеварительная система для студентов 2-курса факультета лечебное дело.docx.exe 3,998,800 49115ff6fe4016169c24ff3783010321 1
23 E:\?? ?????????\Выписка из Протокола.docx.exe 296,581 06dbb0786866ec652b12ddfcc204a735 1
24 eb5eb336636e3f6cacf6c8db6bf4ea00 604,410 eb5eb336636e3f6cacf6c8db6bf4ea00 0
More files

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.


HTML is not allowed.