Home Malware Programs Ransomware CryptoWall Ransomware

CryptoWall Ransomware

Posted: May 12, 2014

Threat Metric

Ranking: 9,308
Threat Level: 10/10
Infected PCs: 11,275
First Seen: May 12, 2014
Last Seen: October 17, 2023
OS(es) Affected: Windows


CryptoWall Ransomware Screenshot 1The CryptoWall Ransomware is a file encryptor Trojan that encodes the data of different file types and holds them hostage. The persons responsible for distributing the CryptoWall Ransomware through hacked websites and other methods demand that any victims make a high payment to return the affected files to readability, but malware researchers recommend against this course of action. As opposed to rewarding ill-minded persons for attacking your PC, file backups can let you restore any encrypted files for free, and anti-malware tools, as usual, can remove the CryptoWall Ransomware, albeit not all of the aftereffects of its attacks.

The CryptoWall Ransomware: the Word that's Hot on Blog Sites

The CryptoWall Ransomware has joined the ranks of other, equally prominent Trojans being distributed through hacked WordPress websites, despite the CryptoWall Ransomware also being seen distributed via spam e-mail and other means. The most recent distribution methods redirect the victim's Web browser through a string of other, hacked sites through iFrame vulnerabilities, eventually leading to the Goon Exploit Kit. Because malware experts have seen that attacks for the CryptoWall Ransomware also rotate alternate payloads into use, the installation of the CryptoWall Ransomware is just one of several, potential consequences of these attacks. WordPress site administrators are, once again, reminded that outdated versions of that Web design platform are especially vulnerable to security breaches, inevitably leading to threat distribution.

With its installation proceeding automatically, the CryptoWall Ransomware can then proceed with encrypting various file types on your hard drives, including image files and text documents. The RSA-2048 encryption will prevent these files from being read properly by your computer, making restoring them from a remote backup the simplest solution. However, the CryptoWall Ransomware will display a ransom-themed pop-up demanding hundreds of dollars' worth in BitCoins, ostensibly before the CryptoWall Ransomware will decrypt the files for you. Naturally, malware experts do not encourage this questionable solution, which relies on unreliable persons making good on their word – after already having taken your money.

Taking Back Your Fair Share of a File Ransom

Due to the inevitable and highly disruptive symptoms associated with a successful CryptoWall Ransomware attack, the CryptoWall Ransomware infections usually should be noticed almost immediately. Regardless of the files encrypted by the CryptoWall Ransomware, the CryptoWall Ransomware also will place additional files into the targeted directories that include its ransom instructions, labeled as 'DECRYPT_INSTRUCTION.' However, the CryptoWall Ransomware's delivery and installation methods are presumed to occur without any visible signs.

Besides the ever-important facets of website administrative security that are relevant to stopping the CryptoWall Ransomware's ongoing campaign (which has targeted charitable organizations, along with blogs), PC users also can disable JavaScript in their Web browsers. Doing so will block many of the exploits used to redirect victims to the attack. In cases of confirmed exposure to such a hacked website, malware researchers recommend disinfecting the PC, whether or not any indicators of the CryptoWall Ransomware's attacks are in evidence.
Like other, similar Trojan distribution campaigns, the CryptoWall Ransomware displays clearly that threat attacks have no need to be creative to be successful or threatening in their larceny.

CryptoWall Ransomware Screenshot 2CryptoWall Ransomware Screenshot 3CryptoWall Ransomware Screenshot 4CryptoWall Ransomware Screenshot 5

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%ALLUSERSPROFILE%\Application Data\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 300B (300 bytes)
MD5: a8f62bf5921bc682767ba649abb0ce9f
Detection count: 375
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 296B (296 bytes)
MD5: 4d565d1d01c01f4edc7c96eb39e93cab
Detection count: 222
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\Application Data\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 276B (276 bytes)
MD5: 08ea8970f1593d049dd00dca7d535c04
Detection count: 169
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 292B (292 bytes)
MD5: 68bab4a48588991342ca900e7b3db1d8
Detection count: 126
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 300B (300 bytes)
MD5: 47bb7af1940f80b1477a4430f576701e
Detection count: 110
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 320B (320 bytes)
MD5: d606f907a0ecd1c6284b8403163db19a
Detection count: 73
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 300B (300 bytes)
MD5: f334d225e7b69922a4b6d721cffd9e5b
Detection count: 68
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 304B (304 bytes)
MD5: 122b42b69934ad0b048b4b33975a6e27
Detection count: 56
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 284B (284 bytes)
MD5: 7c60e7ae33a9252175c0aa1f4cf48b49
Detection count: 56
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\Application Data\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 300B (300 bytes)
MD5: 50c4e43fd6915c1a9cddee1ee66c302f
Detection count: 56
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 284B (284 bytes)
MD5: 44eacd73cfd0dbee7a8f048baf511d76
Detection count: 47
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 276B (276 bytes)
MD5: ba16fa3553de2faee012711ee3be95ca
Detection count: 42
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 292B (292 bytes)
MD5: 8f31b9d3ff75e986362141cbe148c867
Detection count: 40
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 304B (304 bytes)
MD5: b03ea0395f99158ee20e1125f0722a6a
Detection count: 40
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\Application Data\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 296B (296 bytes)
MD5: cdba5dc46a9aa9beec7f583d24006fa9
Detection count: 40
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: August 11, 2017
%APPDATA%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 284B (284 bytes)
MD5: 7ab7c8e43de679951430475a2868c532
Detection count: 26
Mime Type: unknown/URL
Path: %APPDATA%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 304B (304 bytes)
MD5: 9e776be5adb8442bb77346df48a923f1
Detection count: 23
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: August 11, 2017
%ALLUSERSPROFILE%\Application Data\HELP_DECRYPT.URL File name: HELP_DECRYPT.URL
Size: 280B (280 bytes)
MD5: ec022b5fdf508e1412110aa890e0158c
Detection count: 21
Mime Type: unknown/URL
Path: %ALLUSERSPROFILE%\Application Data
Group: Malware file
Last Updated: August 11, 2017
C:\Users\<username>\AppData\Roaming\a5d89829.exe File name: a5d89829.exe
Size: 195.58 KB (195584 bytes)
MD5: edfeb771395e1807109712a2bf158599
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Roaming
Group: Malware file
Last Updated: November 27, 2018
DECRYPT_INSTRUCTION.html File name: DECRYPT_INSTRUCTION.html
Mime Type: unknown/html
Group: Malware file
DECRYPT_INSTRUCTION.url File name: DECRYPT_INSTRUCTION.url
Mime Type: unknown/url
Group: Malware file
DECRYPT_INSTRUCTION.txt File name: DECRYPT_INSTRUCTION.txt
Mime Type: unknown/txt
Group: Malware file

More files

Registry Modifications

The following newly produced Registry Values are:

File name without pathDECRYPT_INSTRUCTION.URLINSTALL_TOR.URLRegexp file mask%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.HTML%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\HELP_DECRYPT.PNG%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\HELP_DECRYPT.url%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\HELP_YOUR_FILES.PNG%HOMEDRIVE%\out.png

Additional Information

The following messages's were detected:
# Message
1Decrypt service
Your files are encrypted.
To get the key to decrypt files you have to pay 500 USD/EUR. If payments is not made before [date] the cost of decrypting files will increase 2 times and will be 1000 USD/EUR Prior to increasing the amount left: [count down timer]
We are present a special software - CryptoWall Decrypter - which is allow to decrypt and return control to all your encrypted files. How to buy CryptoWall decrypter?
1.You should register Bitcoin waller
2. Purchasing Bitcoins - Although it's not yet easy to buy bit coins, it's getting simpler every day.
3. Send 1.22 BTC to Bitcoin address: 1BhLzCZGY6dwQYgX4B6NR5sjDebBPNapvv
4. Enter the Transaction ID and select amount.
5. Please check the payment information and click "PAY".

Loading...