Home Malware Programs Trojans Trojan.Ransomlock.T

Trojan.Ransomlock.T

Posted: October 4, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 237
First Seen: October 4, 2012
Last Seen: November 6, 2024
OS(es) Affected: Windows

Trojan.Ransomlock.T is a Trojan that distributes the Police Service of Nothern Ireland ransomware to the vulnerable computers. Trojan.Ransomlock.T locks the desktop of the affected PC and makes the computer system unusable. Trojan.Ransomlock.T demands the affected computer user to pay the supposed ransom to unlock the computer. When activated, Trojan.Ransomlock.T copies itself to the certain location of the corrupted machine. Trojan.Ransomlock.T creates the specific registry entry so that it can launch automatically whenever you start Windows. Trojan.Ransomlock.T also creates the specific registry entry in order to include itself to the list of programs authorized by the Windows firewall. Once the PC is locked, Trojan.Ransomlock.T displays a fake warning message on the screen, which alerts victims of violation of the certain copyright law and asks them to make a money transfer of $200 via a Ukash or MoneyPak payment system.

Aliases

Trj/Agent.MIZ [Panda]Trojan.DownLoader7.55048 [DrWeb]Troj/DotNet-B [Sophos]Trojan.Genome.airjn.cw3 [CAT-QuickHeal]W32/Small.PNV!tr [Fortinet]Trojan-Downloader.Agent [Ikarus]Trojan/Win32.Genome [AhnLab-V3]Trojan:MSIL/Wantia.A [Microsoft]TrojWare.Win32.Trojan.Svchost [Comodo]Trojan.Win32.Genome.airjn [Kaspersky]Win32.Trojan [eSafe]Trojan [K7AntiVirus]Downloader.a!c2c [McAfee]Trj/CI.A [Panda]Downloader.Agent2.BHQG [AVG]
More aliases (35)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\system\svchost.exe File name: svchost.exe
Size: 87.55 KB (87552 bytes)
MD5: dc5e6611ff13b4321095098400d586e8
Detection count: 119
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\system
Group: Malware file
Last Updated: March 26, 2015
%UserProfile%\Application Data\rt1.png File name: %UserProfile%\Application Data\rt1.png
Mime Type: unknown/png
Group: Malware file
%SystemDrive%\RECYCLER\find_me.tmp File name: %SystemDrive%\RECYCLER\find_me.tmp
File type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
%UserProfile%\Application Data\system\[THREAT FILE NAME].exe File name: %UserProfile%\Application Data\system\[THREAT FILE NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\"Update" = "%UserProfile%\Application Data\system\[THREAT FILE NAME].exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"Shell" = "Explorer.exe, %UserProfile%\Application Data\system\[THREAT FILE NAME].exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Update" = "%UserProfile%\Application Data\system\[THREAT FILE NAME].exe"HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\"%UserProfile%\Application Data\system\[THREAT FILE NAME].exe" = "%UserProfile%\Application Data\system\[THREAT FILE NAME].
Loading...