Jump to content


Photo
- - - - -

Removal instructions for CryptoLocker


  • Please log in to reply
No replies to this topic

#1 Metallica

Metallica

    Elite Member

  • Moderators
  • PipPipPipPipPip
  • 817 posts
  • Gender:Male
  • Location:Netherlands

Posted 05 October 2013 - 09:41 AM

What is Cryptolocker?

The Malwarebytes research team has determined that Cryptolocker is Ransomware. This type of malware denies the user access to his files or the normal use of his computer. They demand payment to restore the computer to the state it was in before the infection.
This particular one looks for files with certain extensions and encrypts them. The targeted files have the extensions:
3fr, accdb, ai, arw, bay, cdr, cer, cr2, crt, crw, dbf, dcr, der, dng, doc, docm, docx, dwg, dxf, dxg, eps, erf, indd, jpe, jpg, kdc, mdb, mdf, mef, mrw, nef, nrw, odb, odm, odp, ods, odt, orf, p12, p7b, p7c, pdd, pef, pem, pfx, ppt, pptm, pptx, psd, pst, ptx, r3d, raf, raw, rtf, rw2, rwl, srf, srw, wb2, wpd, wps, xlk, xls, xlsb, xlsm, xlsx


How do I know if I am infected with Cryptolocker?

You will see this warning when the ransomware is ready encrypting the targeted files:

warning1.png

How did Cryptolocker get on my computer?

Ransomware uses different methods for spreading themselves. This particular one was sent as an attachment in a fake email from a courier-service. The infection is also spread by websites.


How do I remove Cryptolocker?

Our program Malwarebytes' Anti-Malware can detect and remove this ramsomware.

  • Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected. Reboot your computer if prompted.
  • When completed, a log will open in Notepad. The rogue application should now be gone.

Is there anything else I need to do to get rid of Cryptolocker?

Malwarebytes' Anti-Malware removes Cryptolocker completely, but it can not undo the encryption.
There are a few things you can try. Read this post at Bleeping Computer where "Grinler" describes a method using Shadow Volume Copies.
Basically you will need to have some form of backup to retrieve the files.

How would the full version of Malwarebytes' Anti-Malware help protect me?

As you can see below the full version of Malwarebytes' Anti-Malware would have protected you against Cryptolocker. It would have warned you before the ransomware could install itself, giving you a chance to stop it before it became too late.



protection1.png

Technical details for experts

Signs in a HijackThis log:


O4 - HKCU\..\Run: [CryptoLocker] C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe

Note: the CLSID in the filename is semi-random

Alterations made by the installer:






File system details
---------------------------------------------
In the existing folder C:\Users\{username}\AppData\Roaming
Adds the file {112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe"="10/4/2013 5:59 AM, 346112 bytes, HS

Registry details
------------------------------------------
[HKEY_CURENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"CryptoLocker"="REG_SZ, "C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe"

[HKEY_CURRENT_USER\Software\CryptoLocker]
"VersionInfo"=hex:c2,32,9c,81,20,12,cc,d3,cf,54,c9,d3,f4,4a,fe,ec,ca,42,ef,e9,\
da,51,fd,f3,de,45,e4,f9,80,5d,f9,f5,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\
33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,b0,eb,0b,f6,f3,e5,5b,\
d4,b8,e8,01,de,e4,d6,7d,af,b6,c3,46,f4,b7,c9,42,ed,e9,f7,79,c8,d2,e3,72,de,\
eb,c0,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\
ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\
33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,\
9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,\
81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\
ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\
33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,\
9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,\
81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\
ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\
33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81
"PublicKey"=hex:06,02,00,00,00,a4,00,00,52,53,41,31,00,08,00,00,01,00,01,00,ef,\
07,0f,67,68,f6,9c,fa,f9,ef,fa,05,b9,d0,de,59,29,61,1d,35,a7,c6,b3,31,1c,07,\
05,80,67,8f,fc,20,dc,8c,54,c8,73,78,86,97,db,8d,a0,f9,b4,2e,a6,33,b7,fa,8c,\
5f,50,be,cf,72,f4,d3,d4,f1,25,1d,3c,f5,9e,ee,bd,38,c6,07,97,23,aa,8d,51,df,\
31,2a,86,14,a8,92,a7,af,64,23,7b,cb,81,98,40,eb,51,6d,63,3a,e7,f8,25,f4,30,\
5a,e2,e3,26,c5,21,0a,0b,05,6c,34,be,0c,78,de,a7,82,4d,96,48,5e,ab,cf,b9,ae,\
82,eb,e5,25,86,b4,24,a8,90,8e,d4,84,00,f2,bc,b5,40,6c,48,e0,dd,3e,ac,95,58,\
d0,71,90,1b,50,50,97,a2,e1,5c,33,c0,b5,5b,ee,7a,55,81,9d,1e,94,14,13,47,e0,\
54,28,b7,7d,42,a2,8f,40,3a,53,be,99,dc,7a,c3,82,a7,d4,ea,ba,be,b2,55,16,5d,\
ec,5d,c2,8b,31,e9,66,b4,d2,89,b4,eb,5c,59,db,f5,92,b6,b9,d6,93,78,c2,ce,ae,\
70,ba,50,63,ed,d3,fc,5a,68,07,6c,eb,86,1c,6c,c1,a2,74,2a,e0,fd,12,da,cb,2f,\
f1,74,2e,96,e4

[HKEY_CURRENT_USER\Software\CryptoLocker\Files]
"C:?Documents and Settings?Default User?Templates?excel.xls"=dword:0078ce76


Malwarebytes' Anti-Malware log:

Malwarebytes Anti-Malware (PRO) 1.75.0.1300
www.malwarebytes.org

Database version: v2013.10.05.02

Windows 8 x64 NTFS
Internet Explorer 10.0.9200.16660
{username} :: MBAM-VM [administrator]

Protection: Disabled

10/4/2013 10:43:54 PM
mbam-log-2013-10-04 (22-43-54).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 192164
Time elapsed: 1 minute(s), 9 second(s)

Memory Processes Detected: 2
C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> 1364 -> Delete on reboot.
C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> 2028 -> Delete on reboot.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|CryptoLocker (Trojan.Ransom) -> Data: C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe
-> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> Delete on reboot.

(end)

As mentioned before the full version of Malwarebytes' Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.


Pieter Arntz
Malwarebytes Blogger

Posted Image

Follow us: Twitter, Become a fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users