Nytro Posted November 24, 2014 Report Posted November 24, 2014 Understanding Crypto-RansomwareTable of ContentsExecutive Summary 3Introduction 4Dataset and Timeline 6Analysis Methodology 8Results 11Droppers, anti-analysis and persistence 11C&C communication 13Encryption 15Targeted file types 17Payment options 20Implementation, flaws and version evolution 22Conclusion 24References 26Appendix A: Fake Cryptolocker C&C Server 28and CryptDecrypt HookAppendix B: Fake Cryptowall C&C Server 30Appendix C: Hooking WriteProcessMemory 32About Bromium 35Download: http://www.bromium.com/sites/default/files/bromium-report-ransomware.pdf Quote