Jump to content
Nytro

Understanding Crypto-Ransomware

Recommended Posts

Posted

Understanding Crypto-Ransomware

Table of Contents
Executive Summary 3
Introduction 4
Dataset and Timeline 6
Analysis Methodology 8
Results 11
Droppers, anti-analysis and persistence 11
C&C communication 13
Encryption 15
Targeted file types 17
Payment options 20
Implementation, flaws and version evolution 22
Conclusion 24
References 26
Appendix A: Fake Cryptolocker C&C Server 28
and CryptDecrypt Hook
Appendix B: Fake Cryptowall C&C Server 30
Appendix C: Hooking WriteProcessMemory 32
About Bromium 35

Download: http://www.bromium.com/sites/default/files/bromium-report-ransomware.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...