Threat Database Trojans Trojan.Ransomlock.P

Trojan.Ransomlock.P

By Domesticus in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 3
First Seen: May 23, 2012
OS(es) Affected: Windows

Trojan.Ransomlock.P is a ransom Trojan that locks the desktop of the infected computer and generates the 'Willkommem bei Windows Update' ransom page to cover the screen. After successful installation, Trojan.Ransomlock.P drops malicious files. Trojan.Ransomlock.P also affects the Windows Registry to make the targeted computer unusable. Then, Trojan.Ransomlock.P will demand ransom of 100 Euro to be paid via Ukash or Paysafecard by the victim to get an unlock code to unlock the compromised machine. Trojan.Ransomlock.P will contact a remote website and download a HTML page, which carries ransom information.

Aliases

7 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Panda Trj/Dtcontx.D
Fortinet W32/Injector.ZVR!tr
McAfee-GW-Edition Artemis!AAC73468E7E5
Comodo Heur.Suspicious
Sophos Mal/EncPk-AGD
Kaspersky UDS:DangerousObject.Multi.Generic
Symantec Trojan.Ransomlock.P

SpyHunter Detects & Remove Trojan.Ransomlock.P

File System Details

Trojan.Ransomlock.P may create the following file(s):
# File Name MD5 Detections
1. rundll32.exe aac73468e7e525e945b61c3aee41e893 3
2. %System%\[20 HEXADECIMAL NUMBERS].exe
3. %UserProfile%\Application Data\[10 RANDOM CHARACTERS]\[20 HEXADECIMAL NUMBERS].exe
4. %Temp%\[10 RANDOM CHARACTERS].pre
5. decrypted_file.exe c596a2cb629822ae3c086dade6bb1515 0
6. Rechnung.exe 0ddd47c31207a3b92e4483f5911df8ed 0
7. file.exe 3beff4f1c075d0dc16a195c86fa69224 0

Registry Details

Trojan.Ransomlock.P may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\"Debugger" = "P9KDMF.EXE"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\"DisableTaskMgr" = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\"DisableRegedit" = "1"
RANDOM CHARACTERS]\[20 HEXADECIMAL NUMBERS].exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\"Debugger" = "P9KDMF.EXE"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\"DisableTaskMgr" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\[10
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\"Debugger" = "P9KDMF.EXE"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\"DisableRegistryTools" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\"DisableRegedit" = "1"

Trending

Most Viewed

Loading...