Skip to Content

Threat Analysis

CryptoWall Ransomware Threat Analysis

Overview

In late February 2014, the Dell SecureWorks Counter Threat Unitâ„¢ (CTUâ„¢) research team analyzed a family of file-encrypting ransomware being actively distributed on the Internet. Although this ransomware, now known as CryptoWall, became well-known in the first quarter of 2014, it has been distributed since at least early November 2013. CTU researchers consider CryptoWall to be the largest and most destructive ransomware threat on the Internet as of this publication, and they expect this threat to continue growing.

Background

After the emergence of the infamous CryptoLocker ransomware in September 2013, CTU researchers observed an increasing number of ransomware families that destroyed data in addition to demanding payment from victims. While similar threats have existed for years, this tactic did not become widespread until CryptoLocker's considerable success. Traditionally, ransomware disabled victims' access to their computers through non-destructive means until the victims paid for the computers' release.

Early CryptoWall variants closely mimicked both the behavior and appearance of the genuine CryptoLocker (see Figure 1). The exact infection vector of these early infections is not known as of this publication, but anecdotal reports from victims suggest the malware arrived as an email attachment or drive-by download. Evidence collected by CTU researchers in the first several days of the February 2014 campaign showed at least several thousand global infections.

cryptowall_ransomware_01.png

Figure 1. Early CryptoWall variants (left) mimicked CryptoLocker (right). (Source: Dell SecureWorks)

As illustrated by a sample uploaded to the VirusTotal analysis service, CryptoWall has had multiple names. CTU researchers called early variants "CryptoClone" due to a lack of a unique name offered by the threat actors. In mid-March 2014, the authors revealed that the true name of this malware was CryptoDefense. In early May 2014, the malware's name was again changed to CryptoWall.

While neither the malware nor infrastructure of CryptoWall is as sophisticated as that of CryptoLocker, the threat actors have demonstrated both longevity and proficiency in distribution. Similarities between CryptoWall samples and the Tobfy family of traditional ransomware suggest that the same threat actors may be responsible for both families, or that the threat actors behind both families are related.

Infection

CryptoWall has spread through various infection vectors since its inception, including browser exploit kits, drive-by downloads, and malicious email attachments. Since late March 2014, it has been primarily distributed through malicious attachments and download links sent through the Cutwail spam botnet. These Cutwail spam email attachments typically distribute the Upatre downloader, which retrieves CryptoWall samples hosted on compromised websites. Upatre was the primary method of distributing the Gameover Zeus banking trojan until Operation Tovar disrupted that ecosystem in May 2014. Upatre has also been used to distribute the Dyre banking trojan. In June 2014, the malicious emails began including links to legitimate cloud hosting providers such as Dropbox, Cubby, and MediaFire. The links point to ZIP archives that contain a CryptoWall executable.

On June 5, 2014, an aggressive spam campaign launched by Cutwail led to the largest single-day infection rates observed by CTU researchers as of this publication. These emails used a common "missed fax" lure that included links to Dropbox. This spam campaign paused over the weekend but resumed in earnest on June 9-10 with emails purporting to be from financial institutions or government agencies, as shown in Figure 2.

cryptowall_ransomware_02.png

Figure 2. Fake tax payment rejection notice sent by Cutwail on June 10, 2014. (Source: Dell SecureWorks)

On both May 25 and May 28, just prior to this spam campaign, security researchers observed the Angler exploit kit distributing CryptoWall. The RIG exploit kit was also observed distributing this malware between May 19 and May 30. In early May, the Infinity exploit kit (also known as Goon and Redkit V2) was infecting systems with CryptoWall.

Since CryptoWall's emergence in late February 2014, CTU researchers have observed steady but low-level infection rates on Dell SecureWorks client networks. The threat actors behind CryptoWall increased the volume of its distribution in mid-May, resulting in a marked growth in infections (see Figure 3).

cryptowall_ransomware_03.png

Figure 3. CryptoWall infections observed on Dell SecureWorks client networks. (Source: Dell SecureWorks)

On February 26, 2014, CTU researchers registered a domain used by the CryptoWall malware as a backup command and control (C2) server. Through June 13, this sinkhole received connections from 968 unique hosts that appeared to be infected with early CryptoWall variants (see Figure 4).

cryptowall_ransomware_04.pngFigure 4. Unique IP addresses contacting a sinkhole from February 26 to June 13, 2014. (Source: Dell SecureWorks)

The geographic distribution of infected systems indicated a bias towards systems in Asian and Middle Eastern countries, as shown in Table 1.

CountryInfected systemsPercentage of total
India26627.5%
United States14114.6%
Iran11211.6%
Singapore939.6%
Poland555.7%
Pakistan495.1%
Turkey424.3%
Brazil404.1%
Sri Lanka272.8%
Indonesia232.4%

Table 1. Geographic breakdown of infection counts.

Every new infection is assigned a unique alphanumeric code (Base 36), which is allocated sequentially by the CryptoWall backend (e.g., aaaa, aaab, aaac). Between mid-March and August 24, 2014, nearly 625,000 systems were infected with CryptoWall. In that same timeframe, CryptoWall encrypted more than 5.25 billion files. CTU researchers queried the ransom payment server using the codes assigned to each of these systems and collected the IP address, approximate time of infection, and payment status for each infection.

Figure 5 shows the geographic distribution of these compromised systems. Every nation in the world had at least one victim. Most of the infections are in the United States due to CryptoWall's frequent distribution through Cutwail spam targeting English-speaking users.

cryptowall_ransomware_05.pngFigure 5. Global distribution of CryptoWall infections between March 12 (approximate) and August 24, 2014. (Source: Dell SecureWorks)

Table 2 lists the top ten affected countries.

CountryInfected systemsPercentage of total
United States253,52140.6%
Vietnam66,59010.7%
United Kingdom40,2586.4%
Canada32,5795.2%
India22,5823.6%
Australia19,5623.1%
Thailand13,7182.2%
France13,0052.1%
Germany12,8262.1%
Turkey9,4881.5%

Table 2. Geographic breakdown of infection counts.

Each CryptoWall sample is marked with a "campaign ID" that is transmitted to the C2 server during communication. The threat actors use this ID to track samples by infection vector. For example, the "cw400" campaign was used for samples distributed by Cutwail (either through Upatre, direct attachment, or externally linked). Table 3 lists the campaigns identified by CTU researchers. The date ranges are based on the best available evidence. These campaign identifiers could also be used to implement an affiliate program. However, as of this publication, CryptoWall is thought to be controlled and used by a single threat group.

Campaign IDPeriodInfection vector
analteenNovember 5-11, 2013Drive-by download
orgasmNovember 8, 2013Unknown
obamagay1December 30, 2013 - January 1, 2014Unknown
wolfgangFebruary 9-26, 2014Unknown
porno2February 26, 2014Unknown
crypt1February 26, 2014Unknown
crypt11March 8-10, 2014Unknown
def001March 17 - April 17, 2014Cutwail/Upatre
def002March 21, 2014Unknown
def003April 2-7, 2014Cutwail/Upatre
def004April 4-25, 2014Unknown
def006April 10, 2014Unknown
def007April 12-17, 2014Unknown
def201April 28, 2014Unknown
def009April 29 - May 9, 2014Unknown
cw800May 3-20, 2014Infinity/Goon exploit kit
cw100May 9, 2014 - In use as of this publicationMagnitude exploit kit
cw1500May 14 - June 5, 2014Angler exploit kit
cw200May 21, 2014RIG exploit kit
cw400May 21, 2014 - In use as of this publicationCutwail
cw900May 21-23, 2014Unknown
cw700May 29-30, 2014Unknown
cw1600June 3-20, 2014Unknown
cw1900May 26 - June 6, 2014Nuclear exploit kit/Pony Loader
cw2200June 10 - July 4, 2014Unknown
cw2300June 11, 2014Unknown
cw2400UnknownUnknown
cw2500June 19, 2014 - In use as of this publicationGozi/Neverquest
cw404June 26, 2014 - In use as of this publicationCutwail
cw2700July 8-15, 2014Unknown
tor003July 21, 2014Unknown
tor2800July 25, 2014Cutwail
cw2800August 4, 2014 - In use as of this publicationUnknown

Table 3. CryptoWall campaign identifiers, time ranges, and infection vectors.

Execution and persistence

When CryptoWall is first executed, it unpacks itself in memory and injects malicious code into new processes that it creates. It creates an "explorer.exe" process using the legitimate system binary in a suspended state and maps and executes malicious code into the process's address space. This malicious instance of explorer.exe then executes the following process:

  • vssadmin.exe Delete Shadows /All /Quiet

This process causes the Windows Volume Shadow Copy Service (VSS) to delete all shadow copies of the file system. CryptoWall also disables Windows' System Restore feature by modifying the registry key:

  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore => DisableSR

Both techniques prevent infected systems from recovering encrypted files.

Finally, the malicious code creates a "svchost.exe -k netsvcs" process, again using the legitimate system binary. The malicious svchost.exe process is anomalous, as it runs with the privileges of the victim system's user and not as a system process (see Figure 6). Additionally, the process runs independently and does not appear as a child process of services.exe.

cryptowall_ransomware_06.png

Figure 6. CryptoWall masquerading as a legitimate system process. (Source: Dell SecureWorks)

To establish persistence across system reboots, a copy of the malware is placed in %AppData%, %UserProfile%\Start Menu\Programs\Startup, and a directory at the root of the system drive. Then the malware adds multiple "autostart" registry keys (see Figure 7). Some CryptoWall variants also install a "RunOnce" key prefixed with an asterisk, which causes the executable to run even in Safe Mode. Each sample is configured to use a certain six hexadecimal character filename (e.g., 3e0d6a) that the malware uses in other variations (e.g., 3e0d6a9).

 

cryptowall_ransomware_07.png

Figure 7. Registry keys added to establish persistence. (Source: Dell SecureWorks)

More recent CryptoWall variants terminate after successfully encrypting files and notifying the C2 server. At the time of analysis, the malware may not be executing in memory on systems affected by these variants, but the persistence mechanisms remain and ensure that the malware runs upon system reboot.

Network communication

CryptoWall uses an unremarkable C2 system that relies on several static domains hard-coded into each binary. Unlike other prevalent malware families, CryptoWall does not use advanced techniques such as domain generation algorithms (DGA) or fast-flux DNS systems. Although CryptoWall uses the WinINet application programming interface (API) to perform network functions, the malware ignores the system's configured proxy server and instead communicates directly with its C2 servers.

Once CryptoWall is active on a compromised system, it sends an initial phone-home message to the C2 server over HTTP on TCP port 80 (see Figure 8).

cryptowall_ransomware_08.pngFigure 8. CryptoWall phone-home network traffic. (Source: Dell SecureWorks)

These servers use the Privoxy non-caching web proxy and likely act as first-tier servers that proxy traffic from victims to backend servers that manage encryption keys. In late July 2014, several distributed samples used C2 servers hosted on the Tor network, which may indicate the operators intend to eventually stop using traditional, directly accessible servers.

The requested object is the RC4 key used to encrypt the information contained in the POST parameter. The unencrypted request has the following format:

  • {7|cw1900|3E0D6A957E4BF936C016D17B11951E54|4}

The "cw1900" string represents the CryptoWall binary's campaign. The string of 32 hexadecimal characters is a unique infection identifier derived from the compromised system's computer name, disk volume serial number, processor information, and OS version (see Figure 9). This string is also used as a mutex that prevents multiple copies from infecting the same system.

cryptowall_ransomware_09.pngFigure 9. Unique infection identification string generation. (Source: Dell SecureWorks)

An active C2 server responds with data encrypted with the same RC4 key. Each request initiated by the compromised system uses a new RC4 key. After a compromised system successfully contacts an active C2 server, the system sends a second request that prompts the C2 server to send the following reply (shown unencrypted):

  • {216|kpai7ycr7jxqkilp.onion|b0hd|US|-----BEGIN PUBLIC KEY-----
    MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy5uLyGhW15QJZIFp8QK4
    /UNMpkwChp04WmzfwsnSu6CjzKZy0okrjt9iSP6PBPfwYM5CzhepUNNA2RqMPw9X
    V3Vu/yQx3wS1zaSHqqluQkO/iZFxN+5HYKhUYVbOKwl1K2cGD9ynDAcqhQzZCHeT
    0r4+Sy6K8SUiJRnoYG+ipxm7yHTexH+JcQKYWRsbVc/SMkiRI92NhkPM2R/pKRzJ
    n/j2l4p33y19EeCQUkfDRnRQTVbdonqjvus4UYrDlUTKw8G0nLDuKnAAqDaM9wnD
    G0mStK0FqGLXF8Bn6F39UVw9AFb9GpyAMjWAeZ0GGQTsI10amPjqMt2ocGHWQ8j6
    XQIDAQAB
    -----END PUBLIC KEY-----}

This reply includes the Tor payment site, unique payment identifier, country code of the compromised system, and the public key component of the RSA-2048 key pair to encrypt system files. The unique payment identifier allows the victim to navigate to the decryption page specific to their infection. This identifier differs from the unique infection identifier shown in Figure 9, which the threat actors use to identify victims and associate them with the stored RSA private key.

The malware regularly beacons to the C2 server during the encryption process. Once encryption is complete, the malware notifies the C2 server how many files were encrypted:

  • {7|cw1900|3E0D6A957E4BF936C016D17B11951E54|3|all=2284}

The malware does not exfiltrate user credentials, files, or metadata about files. Early CryptoWall variants did transmit a screenshot of the infected system back to the C2 server, but this functionality has not been present in variants distributed since mid-March 2014.

File encryption

File encryption begins after CryptoWall successfully retrieves the RSA public key from an active C2 server. Therefore, using network-based controls to block this communication can prevent compromised systems from becoming encrypted. Unlike CryptoLocker's use of a symmetric cipher, such as AES, to encrypt bulk data, CryptoWall uses the RSA public key to directly encrypt files. Because the RSA algorithm is far more computationally intensive than symmetric ciphers, compromised systems experience significant CPU load after CryptoWall compromises as files are encrypted.

The first explicit indication of an active infection presented to a victim is the web page that CryptoWall opens after encrypting the files (see Figure 10).

cryptowall_ransomware_10.pngFigure 10. CryptoWall "splash" screen presented to victims. (Source: Dell SecureWorks)

CryptoWall variants deployed before April 1, 2014 contained a weakness in the cryptographic implementation that allowed recovery of the key used to encrypt files. This flaw appears to have been corrected in later versions of the malware. CTU researchers have not performed a rigorous assessment of CryptoWall's cryptographic implementation, but they have not discovered any obvious flaws that allow decryption without payment.

CryptoWall recursively navigates the file system, selectively encrypting certain file types (e.g., text files, documents, source code). Executables and DLLs are left unmodified to prevent the compromised system from becoming corrupted and unusable. Table 4 lists the targeted file extensions.

*.c*.h*.m*.ai*.cs*.db*.db*.nd
*.pl*.ps*.py*.rm*.3dm*.3ds*3fr*.3g2
*.3gp*.ach*.arw*.asf*.asx*.avi*.bak*.bay
*.cdr*.cer*.cpp*.cr2*.crt*.crw*.dbf*.dcr
*.dds*.der*.des*.dng*.doc*.dtd*.dwg*.dxf
*.dxg*.eml*.eps*.erf*.fla*.flv*.hpp*.iif
*.jpe*.jpg*.kdc*.key*.lua*.m4v*.max*.mdb
*.mdf*.mef*.mov*.mp3*.mp4*.mpg*.mrw*.msg
*.nef*.nk2*.nrw*.oab*.obj*.odb*.odc*.odm
*.odp*.ods*.odt*.orf*.ost*.p12*.p7b*.p7c
*.pab*.pas*.pct*.pdb*.pdd*.pdf*.pef*.pem
*.pfx*.pps*.ppt*.prf*.psd*.pst*.ptx*.qba
*.qbb*.qbm*.qbr*.qbw*.qbx*.qby*.r3d*.raf
*.raw*.rtf*.rw2*.rwl*.sql*.sr2*.srf*.srt
*.srw*.svg*.swf*.tex*.tga*.thm*.tlg*.txt
*.vob*.wav*.wb2*.wmv*.wpd*.wps*.x3f*.xlk
*.xlr*.xls*.yuv*.back*.docm*.docx*.flac*.indd
*.java*.jpeg*.pptm*.pptx*.xlsb*.xlsm*.xlsx 

Table 4. File extensions targeted for encryption.

Files on fixed (e.g., hard disks), removable (e.g., USB memory), and network drives (when mapped to a drive letter) are targeted for encryption. Furthermore, cloud storage services, such as Dropbox or Google Drive, that are mapped to a targeted file system will also be encrypted. Typically, encrypted files are five to ten percent larger than their original versions. CryptoWall marks encrypted files by prepending a custom header (see Figure 11).

cryptowall_ransomware_11.pngFigure 11. Encrypted files from early (bottom) and later (top) CryptoWall variants. (Source: Dell SecureWorks)

CryptoWall leaves three "DECRYPT_INSTRUCTIONS" files with .url, .txt, and .html extensions in each directory it traverses. These files contain information about the infection and instructions on how to pay the ransom.

The CTU research team discourages victims from paying ransoms because it facilitates the growth of cybercrime enterprises. Victims who choose to pay the ransom submit payment and wait an arbitrary amount of time for the threat actors to confirm the payment. Once the payment has been confirmed, the victim's page on the payment server reflects the changes shown in Figure 12.

cryptowall_ransomware_12.png

Figure 12. Redacted victim landing page after payment confirmation. (Source: Dell SecureWorks)

A "decrypt.zip" archive contains a small (30 KB) decryption program ("decrypt.exe") and the victim's secret RSA key ("secret.key") in Microsoft Cryptographic Provider key BLOB format. The decryption program is a UPX-packed executable that is uniquely generated for each victim after payment.

Payment

Like CryptoLocker, earlier CryptoWall variants included numerous payment options, including pre-paid cards such as MoneyPak, Paysafecard, cashU, and Ukash in addition to the Bitcoin cryptocurrency. Unlike CryptoLocker, the CryptoWall threat actors originally accepted Litecoin (see Figure 13); however, the only observed Litecoin address (LTv4m4y7NKHCXdw31dSEpTJmP6kXTinWDy) never received any payments.

cryptowall_ransomware_13.pngFigure 13. Litecoin payment option in early CryptoWall variants. (Source: Dell SecureWorks)

The ransom has frequently fluctuated at the whim of the botnet operators, and no exact pattern has been established that determines which victims receive a particular ransom value. Ransoms ranging from $200 to $2,000 have been demanded at various times by CryptoWall's operators. The larger ransoms are typically reserved for victims who do not pay within the allotted time (usually 4 to 7 days). In one case, a victim paid $10,000 for the release of their files.

The web page that instructs victims how to pay the ransom displays a static Bitcoin address that is rotated at least once per day. Table 5 lists known Bitcoin addresses, the number of ransoms collected, the value in bitcoins of those received ransoms, and the value in U.S. dollars as of August 24, 2014. CTU researchers directly observed all the addresses in Table 5 in use on the CryptoWall payment servers, except the ones indicated in bold. The addresses in bold were discovered retrospectively by analyzing the transaction history of the Bitcoin network for addresses likely receiving ransom payments.

AddressCollected (BTC)Collected (USD)
1EmLLj8peW292zR2VvumYPPa9wLcK4CPK162.2634$32,377
16N3jvnF7UhRh74TMmtwxpLX6zPQKPbEbh21.2352$11.042
19yqWit95eFGmUTYDLr3memcDoJiYgUppc56.4450$29,351
1ApF4XayPo7Mtpe326o3xMnSgrkZo7TCWD71.9387$37,408
19DyWHtgLgDKgEeoKjfpCJJ9WU8SQ3gr2729.4246$15,301
1LGnuv6KX9SXB8eM72dnBAcECeaC8Z2zje1.6000$832
1K81FeS3TH7DkqrMECtVDwXruRiXPXa6dZ14.9798$7,790
1PnPJfx4ct8YHRnTnx1VrSnrZeQik86BXa40.0517$20,827
14bD9RgtJeKxdJMm5SRbmzFcsk8azTheR99.4715$4,925
1GkBo7k4b1k7ehPYYqiY9jhGXPNCKtyEGi6.0605$3,151
1L7SLmazbbcy614zsDSLwz4bxz1nnJvDeV48.9531$25,456
1HYDwtwtotSedCDCHDcgbRks2a7yPcicwd67.4567$35,077
1CgD9eHj75MP1thzhqU1nEb5jyjkYfMMbK17.9618$9.340
1CeA899xpo3Fe6DQwZwEkd6vQfRHoLuCJD82.0797$42,681
1M4pN4rH4LfXuTaJCL5tpnXJkbVRC35saU9.6855$5,036
1FUEYosFFP9X93yrPzeW5YQpbtpg8eq5Gd2.4603$1,279
18e6Wtkvpf4L9RHwzbgvR9QTUVm1yBybwu15.9021$8,269
17JmFhoJhFKinrKm6XK3LgSmuzfzWyE6gi8.8915$4,624
1MrnUHFADbj5S9ERJ9bGXtQvhx81TFztMN17.2850$8,988
1LPAUi1LWzCsRLkGFWFdN5sENs1LufBfNp33.4070$17,372
1JTEjiizLihT6GbvoW52Abmg6rV1KyD3fw40.8381$21,236
1ASm3RVYjjpLmMTECCkoy8yLmUN9rmE9aS12.8446$6,679
1Pa7ZkA9JHzwp8FazU4YBVSiYFPP3majgA18.5848$9,664
1FAB6uvKD9q5MnGm3ta1ERvmeVpYgyNQwj20.0374$10,419
1M8oK3D2G8ipTy7sCxiatrHC35CpAgmrrw76.7055$39,887
1DDPoA3rnXtHtp71v3KAtd53pdRTmskxrK9.3686$4,872
16yd1Wj2NZa2uLZ6W4UDCDJ2Ttw92uFaT728.1476$14,637
1BhLzCZGY6dwQYgX4B6NR5sjDebBPNapvv2.7601$1,435
1LV8hdp4rTfRESUT3FoZhgxnSW4xthqpS32.1511$1,119
1AkJptnuoiQAD3GmHMFHBSMxZ9H2GKJTkB32.4437$16,871
14ytdF3C9VRbttMfh9J56yR9ZWqfmFbBWN11.2697$5,860
13BeAzA4mhwDYJEwhqNd2LsUnuhuVqKvw817.0646$8,874
1PgsYJKnnKk1mxLGY9hHFgtuBffGx2E9HR10.0326$5,217
13Kqgurx7eQg3G29NwV7ouJ8UHJRSUwwAe39.5325$20,557

Table 5. Known CryptoWall Bitcoin addresses and received transfer totals.

The total inflow to the addresses in Table 5 is approximately 939 BTC. At the BTC exchange rate as of August 24, 2014 (1 BTC = $520), threat actors have received more than $488,000 in ransoms. These payments represent a subset of the total CryptoWall payments thought to be received. Some payments made to these addresses did not fit the pattern of CryptoWall ransom payments and may be income from other, unrelated criminal activity.

Data collected directly from the ransom payment server reveals the exact number of paying victims as well as the amount they paid. Of nearly 625,000 infections, 1,683 victims (0.27%) paid the ransom, for a total take of $1,101,900 over the course of six months. The distribution of ransom payments is shown in Table 6.

Ransom amountNumber paidPercentage
$20060.4%
$5001,08764.6%
$60030.2%
$7501227.2%
$100039923.7%
$1500271.6%
$17501<0.1%
$200060.4%
$100001<0.1%

Table 6. Distribution of ransom payments made by victims.

Based on post-mortem data collected by researchers, CryptoWall has been less effective at producing income than CryptoLocker. Both malware families accepted payments via Bitcoin, with 0.27% of CryptoWall victims and 0.21% of CryptoLocker victims paying ransoms in bitcoins. CryptoLocker also accepted MoneyPak, and an additional 1.1% of victims paid ransoms using pre-paid MoneyPak cards. As of this publication, CryptoWall has only collected 37% of the total ransoms collected by CryptoLocker despite infecting nearly 100,000 more victims. CryptoWall's higher average ransom amounts and the technical barriers typical consumers encounter when attempting to obtain bitcoins has likely contributed to this malware family's more modest success. Additionally, it is likely the CryptoWall operators do not have a sophisticated "cash out" and laundering operation like the Gameover Zeus crew and cannot process pre-paid cards in such high volumes.

Conclusion

In mid-March 2014, CryptoWall emerged as the leading file-encrypting ransomware threat. The threat actors behind this malware have several years of successful cybercrime experience and have demonstrated a diversity of distribution methods. As a result, CTU researchers expect this threat will continue to grow.

The following actions may mitigate exposure to or damage from CryptoWall:

  • Block executable files and compressed archives containing executable files before they reach a user's inbox.
  • Keep operating systems, browsers, and browser plugins, such as Java and Silverlight, fully updated to prevent compromises resulting from exposure to exploit kits.
  • Aggressively block known indicators from communicating with your network to temporarily neuter the malware until it can be discovered and removed.
  • Reevaluate permissions on shared network drives to prevent unprivileged users from modifying files.
  • Regularly back up data with so-called "cold" offline backup media. Backups to locally connected, network-attached, or cloud-based storage are not sufficient because CryptoWall encrypts these files along with those found on the system drive.

Software Restriction Policies (SRPs) do not effectively mitigate CryptoWall due to the way the malware infects systems.

Threat indicators

To mitigate exposure to the CryptoWall malware, CTU researchers recommend that clients use available controls to restrict access using the indicators in Table 7. The domains and IP addresses listed in the indicator table may contain malicious content, so consider the risks before opening them in a browser.

IndicatorTypeContext
youtubeallin.comDomain nameC2 server
serbiabboy.comDomain nameC2 server
hairyhustler.comDomain nameC2 server
yoyosasa.comDomain nameC2 server
uprnsme.comDomain nameC2 server
dealwithhell.comDomain nameC2 server
wawamediana.comDomain nameC2 server
qoweiuwea.comDomain nameC2 server
dominikanabestplace.comDomain nameC2 server
nofbiatdominicana.comDomain nameC2 server
dominicanajoker.comDomain nameC2 server
likeyoudominicana.comDomain nameC2 server
khalisimilisi.comDomain nameC2 server
posramosra.comDomain nameC2 server
maskaradshowdominicana.comDomain nameC2 server
newsbrontima.comDomain nameC2 server
yaroshwelcome.comDomain nameC2 server
granatebit.comDomain nameC2 server
rearbeab.comDomain nameC2 server
droterdrotit.comDomain nameC2 server
kukisasda8121.comDomain nameC2 server
tyuweirwsdf18741.comDomain nameC2 server
machetesraka.comDomain nameC2 server
markizasamvel.comDomain nameC2 server
wachapikchaid91.comDomain nameC2 server
hilaryclintonbest81.comDomain nameC2 server
niggaattack23.comDomain nameC2 server
norevengenosuck.comDomain nameC2 server
stopobamastopusa.comDomain nameC2 server
jiromepic.comDomain nameC2 server
clocksoffers.comDomain nameC2 server
gretableta.comDomain nameC2 server
kaikialexus.comDomain nameC2 server
babyslutsnil.comDomain nameC2 server
wartbartmart.comDomain nameC2 server
la4eversuck.comDomain nameC2 server
obsesickshit.comDomain nameC2 server
mamapapafam.comDomain nameC2 server
usawithgitler.comDomain nameC2 server
kickasssisters.comDomain nameC2 server
bdsmwithyou.comDomain nameC2 server
iampeterbaby.comDomain nameC2 server
teromasla.comDomain nameC2 server
torichipinis.comDomain nameC2 server
gitlerluvua.comDomain nameC2 server
covermontislol.comDomain nameC2 server
usaalwayswar.comDomain nameC2 server
bolizarsospos.comDomain nameC2 server
titaniumpaladium.comDomain nameC2 server
adolfforua.comDomain nameC2 server
vivatsaultppc.comDomain nameC2 server
milimalipali.comDomain nameC2 server
poroshenkogitler.comDomain nameC2 server
waltabaldasd.comDomain nameC2 server
dancewithmeseniorita.comDomain nameC2 server
indeedlinkme.comDomain nameC2 server
crunkthatme.comDomain nameC2 server
hungarymethis.comDomain nameC2 server
terrymerry.comDomain nameC2 server
lvoobptv6w5zanxu.onionTor addressC2 server
hyzcrtwh6ispjwj4.onionTor addressC2 server
2yd2bu2k5ilgxv6u.onionTor addressC2 server
kpai7ycr7jxqkilp.onionTor addressPayment server
78.110.175.80IP addressC2 server (United Kingdom)
192.64.115.86IP addressC2 server (United States)
5.101.146.182IP addressC2 server (United Kingdom)
199.188.203.16IP addressC2 server (United States)
46.19.143.234IP addressC2 server (Switzerland)
162.213.250.163IP addressC2 server (United States)
192.64.115.91IP addressC2 server (United States)
141.255.167.3IP addressC2 server (Switzerland)
199.188.206.202IP addressC2 server (United States)
185.12.44.5IP addressC2 server (Switzerland)
194.58.101.3IP addressC2 server (Russia)
192.31.186.3IP addressC2 server (United States)
31.31.204.59IP addressC2 server (Russia)
194.58.101.96IP addressC2 server (Russia)
194.58.101.112IP addressC2 server (Russia)
194.58.101.111IP addressC2 server (Russia)
151.248.124.30IP addressC2 server (Russia)
199.127.225.232IP addressC2 server (United States)
3769639c17f0cd5045964b0839c9f009MD5 hashMalware sample
03467f231a3fce6795545ae99a6dad161effa3bf681031693815eabf1648ee66SHA256 hashMalware sample
85f830c85cc881358dfb631ef1f54a1aMD5 hashMalware sample
7ed58ef4fd3dc4efaea9e595614553445afb055c0c675b692f12a5629251b040SHA256 hashMalware sample
b6c7943c056ace5911b95d36ff06e0e4MD5 hashMalware sample
d5a70ba5a194ab737fc52b9f4283ce9d32f090590aea34224f7ea9ec63557a4fSHA256 hashMalware sample
b30a8168ff49145d7d3cdcfd47dbfaefMD5 hashMalware sample
23eae15fbd3fff11ae9c0a74dec2f078a0213b6df54cf0011a0f5feae20437ecSHA256 hashMalware sample
167f16c8ae349cfb7d450cdf335dd9caMD5 hashMalware sample
fa706ed93469c257ee1531ddcf57bbab8734f3d092712158faf4e27656ab832eSHA256 hashMalware sample
a7e38522f8ff161968f72d8bcc956b4eMD5 hashMalware sample
fc5e57f70bdce3af0e8c43d124eacd1ead0be79bf369284f85a5f81c629f345eSHA256 hashMalware sample
f612500ee9764e18ca78d2e78df5b017MD5 hashMalware sample
7351e53bd863795104d609f2192e3436d3a07fb597f0bab35d175df88a34c3e0SHA256 hashMalware sample
e36bbd682b5dd435baec8ec268c9c825MD5 hashMalware sample
d14f1d1e07bd116ed0faf5896438177f36a05adacf5af4f32910e313e9c1fd93SHA256 hashMalware sample
44150a32a84d3e1e07a042c3042a854cMD5 hashMalware sample
114df2c77884312fc58d48bb6c4eb2ae23bbea2c37aad29c6fc0f544d7a16e36SHA256 hashMalware sample
189d1d0c7ec162533b4aff4b8d0e95b1MD5 hashMalware sample
a7c2b304848f18c412776e5f461b42186b690eeed7b2955522f9fe716cfa3876SHA256 hashMalware sample
3e9929a6751f184cb71d3c4adfc6fb78MD5 hashMalware sample
ab89a375ba9a0ec6ddc875ddde7647c4d2a140b07233580b143e0ca9aaf581f5SHA256 hashMalware sample
2fde49072741d59fd941b494403b9b0fMD5 hashMalware sample
63d4965ed89e6951bb68f5e76a28f7f9512bf3feb64fcedfc3b98bc72dbcd070SHA256 hashMalware sample
934b014689771a7689c70cd179c8bd71MD5 hashMalware sample
a66b62735473fe257d35d003eb71aeb832e055d6f727e42ef1880c4d054118bbSHA256 hashMalware sample
fc8db5b43ddf09bf0f03171e262495f6MD5 hashMalware sample
47faaf4ab59c18ad9c72df1bec65873c350b5d72f361a723ae5f8b279a5b6b22SHA256 hashMalware sample
00b536d9838b3e19d0ded1a6612a8b53MD5 hashMalware sample
a3ccdcf57d11314b8db4733eb67ab06f41a710c2e3404a26e5390465bcff7609SHA256 hashMalware sample

Table 7. Indicators for CryptoWall ransomware.