Crylock

Known to be a RaaS

Description

CryLock is a ransomware variant that emerged around April 2020, evolving from the Cryakl (Fantomas) ransomware family. It follows a semi-affiliate model, offering customizable options for partners—such as variable encryption routines, network scanning for lateral movement, shadow copy deletion, and process termination—and flexible delivery methods. During encryption, CryLock renames files to include the developer email, a unique victim ID, and a randomized three-letter extension. Victims typically encounter a countdown timer in a pop-up ransom message that warns about escalating ransom costs and potential loss of decryption capabilities.

External Analysis
https://www.pcrisk.com/removal-guides/16814-crylock-ransomware
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.crylock.h
https://www.alartindex.com
https://www.singleton.com/blog/describing-crylock-ransomware
https://www.watchguard.com/
Mail
grand@horsef***er.org
flydragon@mailfence.com
tomascry@protonmail.co
Telegram
@assist_decoder
@Fileraptor
@Helpdecrypt
Urls
Screen
http://d57uremugxjrafyg.onion
File servers
Screen
Chat servers
Screen
Admin servers
Screen