Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

CryptoWall

106
Global rank
54 infographic chevron month
Month rank
63 infographic chevron week
Week rank
0
IOCs

CryptoWall is a notorious ransomware family that emerged in early 2014 and rapidly became one of the most destructive cyber threats of its time. This malware encrypts victims' files using strong AES encryption, demands ransom payments in Bitcoin, and has generated hundreds of millions of dollars for cybercriminals.

Ransomware
Type
Unknown
Origin
1 January, 2014
First seen
11 November, 2025
Last seen

How to analyze CryptoWall with ANY.RUN

Type
Unknown
Origin
1 January, 2014
First seen
11 November, 2025
Last seen

IOCs

IP addresses
156.240.115.54
43.163.232.5
43.130.241.232
43.153.177.133
43.130.232.151
43.157.112.212
43.133.128.222
194.87.218.168
170.106.191.44
43.155.169.56
43.155.186.62
43.153.41.180
43.129.50.186
157.7.174.190
173.230.130.167
137.59.111.191
5.199.165.160
103.6.196.69
94.247.28.29
178.33.210.83
Hashes
6dd743abe9b003619b064064e8146f81755b6d7362ac73bb585f9cd2ee1954d0
7a44c7a56524eb9eb5abee6e4535b3e146793d80f272a9de84b035531c1cb2e9
Domains
mabawamathare.org
httthanglong.com
ks0407.com
19bee88.com
lexscheep.com
davis1.ru
flexiblepestsolutions.com
stwholesaleinc.com
tuvestir.com
salamasisters.org
champagneframeofmind.com
likeyoudominicana.com
rearbeab.com
paytordmbdekmizq.pay4tor.com
yoyosasa.com
londonparig.tk
konrad.szalapak.eu
machetesraka.com
frc-pr.com
novolani.com
Last Seen at
Last Seen at

Recent blog posts

post image
ANY.RUN Wins Trailblazing Threat Intelligence...
watchers 668
comments 0
post image
Unified Security for Fast Response: All ANY.R...
watchers 755
comments 0
post image
Release Notes: ANY.RUN & ThreatQ Integrat...
watchers 4057
comments 0

CryptoWall Ransomware: How the Comeback Veteran Still Costs Businesses Millions

Key Takeaways

  1. CryptoWall remains active through code reuse and updated variants.
  2. Its main vectors: phishing, exploit kits, and RDP brute force.
  3. Businesses lose not only money — but operations and reputation.
  4. Detection requires layered security: EDR, logging, sandboxing.
  5. Offline backups dramatically reduce impact and negotiation leverage.
  6. Threat Intelligence Lookup lets analysts instantly check IOCs against data from 15K SOCs worldwide.

filePath:"Project_Workshop_7th_Minutes.txt".

File detected as CryptoWall IOC via TI Lookup File detected in CryptoWall malware samples via TI Lookup

  1. ANY.RUN's Sandbox helps analyze CryptoWall behavior and extract fresh indicators.

View analysis

CryptoWall sample in the Sandbox CryptoWall sample detonated in the ANY.RUN Sandbox

What is CryptoWall Malware?

CryptoWall represents a pivotal evolution in ransomware, transforming from a crude CryptoLocker clone into a sophisticated, polymorphic threat. Initially distributed in November 2013, it gained prominence in early 2014, after law enforcement dismantled CryptoLocker's infrastructure. By mid-2015, it has generated an estimated $325 million in revenue for its operators through relentless campaigns.

Unlike earlier ransomware that merely locked screens, CryptoWall employs asymmetric RSA encryption to scramble files across local drives, network shares, and removable media, appending extensions like .cryptowall to affected documents, photos, and databases. Its variants, up to CryptoWall 4.0, incorporated anti-detection techniques, such as Tor and I2P anonymity networks for command-and-control (C2) communication, RC4-encrypted traffic, and polymorphic code to evade antivirus signatures.

The malware communicates with command-and-control servers over the Tor anonymous network, making it difficult to trace or disrupt. After encryption, victims receive detailed ransom notes with instructions for payment, typically ranging from $200 to $10,000, though some victims reportedly paid significantly more. CryptoWall's trademark is its psychological warfare: ransom notes taunt victims with countdown timers, previews of decryptable files to build false hope, and threats to destroy keys if unpaid, often within 72 hours.

What distinguishes CryptoWall from simpler ransomware is its technical sophistication. It operates on both 32-bit and 64-bit systems, deletes shadow copies to prevent file recovery, disables System Restore features, and even installs spyware to steal passwords and Bitcoin wallets. The encryption implementation is effectively unbreakable without the private key held by attackers, making prevention the only viable defense strategy.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

CryptoWall Ransomware Victimology

The targeting strategy appears opportunistic rather than selective. CryptoWall campaigns have affected individuals who accidentally opened malicious email attachments, businesses whose employees fell victim to phishing schemes, and organizations with unpatched software vulnerabilities. Notable incidents included the Australian Broadcasting Corporation, which experienced disrupted television programming due to a CryptoWall infection, and numerous healthcare organizations that faced operational challenges when patient records became encrypted.

Geographic analysis shows that targets have primarily been concentrated in the United States and United Kingdom, though infections occurred globally. The ransomware infected over 625,000 systems within its first six months of widespread distribution, encrypting approximately 5.25 billion files.

How CryptoWall Functions

The attack sequence begins when the malware gains initial access through various infection vectors. Email remains the primary distribution method, with attackers using the Cutwail spam botnet sending massive campaigns that contain malicious attachments or links.

When victims open attachments disguised as PDF files, Word documents, or ZIP archives, they actually execute the dropper, which then contacts compromised websites to download the CryptoWall payload. This multi-stage delivery complicates detection, as the initial file may appear benign to security software while the actual ransomware is fetched dynamically.

Exploit kits represent another major infection vector. Major advertising networks serving sites including Disney, Facebook, and The Guardian were compromised in campaigns that exposed millions of users to potential infections.

Within organizational networks, CryptoWall spreads by encrypting files on network shares accessible to the infected user account. While the malware doesn't include worm-like capabilities for self-propagation between systems, its ability to encrypt files across mapped network drives means a single infected endpoint can potentially encrypt data throughout an entire organization.

Upon execution, the ransomware immediately attempts to establish persistence mechanisms, though later variants operate entirely in memory to avoid disk-based detection.

The malware's first critical action involves contacting command-and-control servers, typically hosted on the Tor network for anonymity. This communication serves multiple purposes: retrieving the public key used for encrypting the symmetric encryption keys, registering the victim with a unique identifier, and receiving configuration parameters that control the encryption process. If network connectivity fails, some variants will wait and retry rather than proceeding, as the C2 communication is essential for the attack's success.

Once connected, CryptoWall initiates its file discovery and encryption routine. The malware creates malicious instances of legitimate Windows processes like explorer.exe and svchost.exe to perform its operations, helping it blend with normal system activity. It systematically enumerates all accessible storage, identifying files with targeted extensions. The encryption process uses AES symmetric encryption for speed, with each file receiving a unique AES key. These symmetric keys are then encrypted with an RSA public key, making recovery impossible without the corresponding private key held by attackers.

Throughout the encryption process, CryptoWall takes defensive actions to prevent recovery. It deletes Volume Shadow Copies using the Windows vssadmin.exe utility with commands like "vssadmin delete shadows /all /quiet" to eliminate backup copies without user notification. The malware modifies registry entries to disable System Restore and may clear Windows Event Logs to remove evidence of its activities. Some variants also attempt to disable or evade antivirus software through various techniques including process injection and rootkit-like behaviors.

Sandbox Analysis of a CryptoWall Sample

ANY.RUN's interactive malware sandbox allows analysts to safely execute and analyze CryptoWall samples, revealing evasion techniques, C2 communications, and encryption behaviors that inform detection rules and defensive strategies.

View a CryptoWall sample analysis

CryptoWall Sandbox analysis CryptoWall Sandbox analysis

The malware is distributed as an LNK file disguised as a legitimate shortcut. When opened, the LNK launches a PowerShell script that executes the core functionality.

The script tracer of the Sandbox shows how at the start, the malware creates a scheduled task to ensure persistence. The parameters are added: daily mode, no additional day intervals or random delays, and an exact start time of 17:00. Additional options are configured so the task runs even on battery power, does not stop when switching to battery, starts as soon as possible, and ignores the computer's sleep mode.

CryptoWall script establishing persistence CryptoWall script establishing persistence

The malicious program also launches Windows Notepad to display the file Project_Workshop_7th_Minutes.txt, created to mask the program's main functionality.

CryptoWall key processes CryptoWall key processes

The encryption process can be divided into several stages. File discovery occurs recursively through user directories, skipping system folders.

Encryption uses the typical combination of symmetric AES for file encryption. The AES key is encrypted with the attackers' public RSA key. This encrypted AES key, along with the initialization vector and the encrypted file contents, is appended to the end of the file.

Encryption code snippet PowerShell commands showing AES key generation and RSA encryption

A ransom note is created as an HTML file with detailed payment instructions and a timer to pressure the victim into acting quickly.

CryptoWall ransom note screenshot CryptoWall ransom message screenshot with countdown timers for payment and file deletion

Overall, CryptoWall is a classic ransomware specimen: a combination of stealthy infection, rapid encryption, and mechanisms to pressure the victim. Regularly back up important files to external media, use up-to-date antivirus software, monitor the Windows Task Scheduler for suspicious entries, disable macros in Office and PDF files, and train users not to open suspicious shortcuts from emails or downloaded files.

How CryptoWall ransomware threatens businesses and organizations

For healthcare organizations, CryptoWall infections can delay patient care, limit access to medical records, and force reliance on paper-based systems. Educational institutions face interrupted classes, lost research data, and administrative challenges. Financial services organizations risk regulatory penalties for data security failures, while manufacturing and logistics companies experience supply chain disruptions when production systems become unavailable.

Customers and partners lose confidence in organizations that suffer ransomware attacks, particularly if sensitive data is potentially compromised. Media coverage of infections can damage brand value and market position. Even organizations that successfully recover from attacks often face long-term trust deficits that affect business relationships and customer retention.

Gathering Threat Intelligence on CryptoWall ransomware

Threat Intelligence Lookup enables security teams to quickly search for information about suspicious files, URLs, domains, and IP addresses potentially associated with CryptoWall.

By querying file hashes or URLs encountered in environments, analysts can immediately determine if they match known CryptoWall samples, view detailed behavioral analysis, and understand the specific capabilities and infrastructure of particular variants.

This rapid intelligence access accelerates incident response and enables proactive blocking of threats before they impact systems.

Start exploring the threat by looking it up by the name:

threatName:"cryptowall".

CryptoWall samples found via TI Lookup Malware samples with CryptoWall detected, found via TI Lookup]

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

CryptoWall demonstrates how cybercriminals can weaponize strong encryption to generate hundreds of millions of dollars while causing widespread organizational disruption. Though newer ransomware families have emerged since CryptoWall's peak activity, the fundamental threat model it established (combining multiple infection vectors, strong encryption, anonymous infrastructure, and cryptocurrency payments) persists across modern ransomware operations.

Modern threat intelligence and analysis tools have evolved significantly in response to threats like CryptoWall. Malware sandboxes, threat intelligence platforms, and security automation enable faster detection, more effective response, and proactive defense strategies that were unavailable during CryptoWall's emergence. Organizations that leverage these capabilities while maintaining security fundamentals position themselves to resist not only CryptoWall variants that may still circulate but also the next generation of ransomware threats.

Start gathering actionable threat intelligence on CryptoWall by signing up to ANY.RUN’s TI Lookup: protect your business with timely detection and response.

HAVE A LOOK AT

Tykit screenshot
Tykit
tykit
Tykit is a sophisticated phishing-as-a-service (PhaaS) kit that emerged in May 2025, designed to steal Microsoft 365 corporate credentials through an innovative attack vector: malicious SVG files.
Read More
Trojan screenshot
Trojan
trojan trojan horse
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
Read More
Ransomware screenshot
Ransomware
ransomware
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Read More
Spynote screenshot
Spynote
spynote
SpyNote, also known as SpyMax and CypherRat, is a powerful Android malware family designed primarily for surveillance and data theft, often categorized as a Remote Access Trojan (RAT). Originally emerged in 2016, SpyNote has evolved significantly, with new variants continuing to appear as recently as 2023–2025.
Read More
WhiteSnake screenshot
WhiteSnake
whitesnake
WhiteSnake is a stealer with advanced remote access capabilities. The attackers using this malicious software can control infected computers and carry out different malicious activities, including stealing sensitive files and data, recording audio, and logging keystrokes. WhiteSnake is sold on underground forums and often spreads through phishing emails.
Read More
Bumblebee Loader screenshot
Bumblebee Loader
bumblebee
Bumblebee is a highly adaptable malware loader, often used by threat actors linked to the Conti and TrickBot cybercrime groups. Since its discovery in 2021, Bumblebee has been leveraged in phishing campaigns and email thread hijacking, primarily to distribute payloads like Cobalt Strike and ransomware. The malware employs obfuscation techniques, such as DLL injection and virtual environment detection, to avoid detection and sandbox analysis. Its command-and-control infrastructure and anti-analysis features allow it to persist on infected devices, where it enables further payload downloads and system compromise.
Read More