Home Malware Programs Trojans Trojan.Ransomlock.AA

Trojan.Ransomlock.AA

Posted: November 30, 2012

Threat Metric

Ranking: 11,538
Threat Level: 9/10
Infected PCs: 328
First Seen: November 30, 2012
Last Seen: March 10, 2025
OS(es) Affected: Windows

Trojan.Ransomlock.AA is a Trojan that is used by attackers to spread ransomware programs. Trojan.Ransomlock.AA locks the desktop of the affected computer and makes it unusable. Trojan.Ransomlock.AA then asks the affected PC user to pay a ransom to unlock it. Once executed, Trojan.Ransomlock.AA copies itself to the certain locations. Trojan.Ransomlock.AA creates the certain registry entry so that it can run automatically when Windows is started. Trojan.Ransomlock.AA also modifies the certain registry entry to assure its automatic running at each Windows start-up. Trojan.Ransomlock.AA displays a fake notification demanding a fine to be paid to restore access to the blocked computer. Trojan.Ransomlock.AA also connects to the certain remote location.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%UserProfile%\Application Data\[THREAT FILE NAME].exe File name: %UserProfile%\Application Data\[THREAT FILE NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%UserProfile%\Local Settings\Application Data\[THREAT FILE NAME].exe File name: %UserProfile%\Local Settings\Application Data\[THREAT FILE NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Command Processor\"AutoRun" = "%UserProfile%\Application Data\[THREAT FILE NAME].exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"Shell" = "Explorer.exe, %SystemDrive%\Documents and Settings\All Users\Application Data\[THREAT FILE NAME].exe"
Loading...