Home Malware Programs Trojans Trojan.Ransomlock.P

Trojan.Ransomlock.P

Posted: May 23, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 7
First Seen: May 23, 2012
OS(es) Affected: Windows

Trojan.Ransomlock.P is a ransom Trojan that locks the desktop of the affected computer by making the PC unusable. Trojan.Ransomlock.P then asks the PC user to pay a ransom of 100 Euro to unlock the computer. Once executed, Trojan.Ransomlock.P creates several malicious files. Next, Trojan.Ransomlock.P modifies the registry by creating the certain registry entry so that it can run automatically whenever Windows starts. Next, Trojan.Ransomlock.P also creates and modifies several registry entries in order to disable Registry Editor, Windows Task Manager, and System Configuration. Then, Trojan.Ransomlock.P contacts the certain domain [http://]ogutors-free.com/[REMOVED] and downloads a HTML page that includes ransom information. The page illustrates details about the ransom and suggests a way for the PC user to enter an unlock code that can be received after paying the ransom by making an online transaction via Paysafecard or Ukash.

Aliases

Trj/Dtcontx.D [Panda]W32/Injector.ZVR!tr [Fortinet]Artemis!AAC73468E7E5 [McAfee-GW-Edition]Heur.Suspicious [Comodo]Mal/EncPk-AGD [Sophos]UDS:DangerousObject.Multi.Generic [Kaspersky]Trojan.Ransomlock.P [Symantec]

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



decrypted_file.exe File name: decrypted_file.exe
Size: 24.57 KB (24576 bytes)
MD5: c596a2cb629822ae3c086dade6bb1515
Detection count: 63
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 28, 2012
file.exe File name: file.exe
Size: 58.36 KB (58368 bytes)
MD5: 3beff4f1c075d0dc16a195c86fa69224
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 28, 2012
Rechnung.exe File name: Rechnung.exe
Size: 60.41 KB (60416 bytes)
MD5: 0ddd47c31207a3b92e4483f5911df8ed
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 28, 2012
%USERPROFILE%\rundll32.exe File name: rundll32.exe
Size: 120.83 KB (120832 bytes)
MD5: aac73468e7e525e945b61c3aee41e893
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%
Group: Malware file
Last Updated: April 29, 2013
%UserProfile%\Application Data\[10 RANDOM CHARACTERS]\[20 HEXADECIMAL NUMBERS].exe File name: %UserProfile%\Application Data\[10 RANDOM CHARACTERS]\[20 HEXADECIMAL NUMBERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Temp%\[10 RANDOM CHARACTERS].pre File name: %Temp%\[10 RANDOM CHARACTERS].pre
Mime Type: unknown/pre
Group: Malware file
%System%\[20 HEXADECIMAL NUMBERS].exe File name: %System%\[20 HEXADECIMAL NUMBERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM CHARACTERS]" = "%UserProfile%\Application Data\[10 RANDOM CHARACTERS]\[20 HEXADECIMAL NUMBERS].exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\"Debugger" = "P9KDMF.EXE"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\"Debugger" = "P9KDMF.EXE"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\"Debugger" = "P9KDMF.EXE"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\"DisableTaskMgr" = "1"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\"DisableRegistryTools" = "1"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\"DisableTaskMgr" = "1"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\"DisableRegedit" = "1"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\"DisableRegedit" = "1"

Additional Information

The following messages's were detected:
# Message
1'Welcome to Windows Update You have been infected with a Windows Verschlusselungs Trojans. For security reasons your Windows system was blocked. Your visit to pages with pornographic content has led to the ransom Trojan infection. This virus encrypts your hard drive with a 256 bit AES Key and a standardized self-ended decryption is not feasible.'
2'Willkommen bei Windows Update Sie haben sich mit einem Windows-Verschlusselungs Trojaner infiziert. Aus Sicherheitsgrunden wurde lhr Windows system blockiert. Das Besuchen von Seiten mit pornografischen und infizierten Inhalten hat dazu gefuhrt, das lhr System von einem Computerverschlusselungstrojaner befallen wurde. Dieses Virus verschlusselt Ihre Festplatte mit einem 256 Bit AES Shlussel und eine selbststandige Entschlusselung ist nicht mehr machbar.'

Loading...