Ctblocker

Description

aka Critroni
CTB‑Locker emerged in mid‑2014, introducing a new era of ransomware by leveraging elliptic curve cryptography (ECC), Tor-based C&C communication, and Bitcoin payments—earning its name from “Curve-Tor-Bitcoin Locker.” It was packaged and sold as a ransomware kit for approximately $1,500–$3,000, allowing affiliates to deploy customized campaigns. The malware encrypts user data (including network and removable drives), changes desktop wallpapers, and appends file extensions like .CTBL, .CTB2, or randomized strings. Victims receive instructions for payment, typically within a limited timeframe, or risk permanent data loss. In 2015–2017, law enforcement and cybersecurity firms (including McAfee and Kaspersky) disrupted the network, arrested operators, and facilitated decryption tools.

External Analysis
https://cert.gov.az/en/articles/ctb-locker-and-critroni-ransomware-information-guide-and-faq
https://heimdalsecurity.com/blog/ctb-locker-ransomware/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/advanced-threat-research/
https://www.eset.com/afr/about/newsroom/press-releases-afr/company/ctb-locker-ransomware-striking-in-europe-and-latin-america10/
Urls
Screen
File servers
Screen
Chat servers
Screen
http://ohmva4gbywokzqso.onion/
http://tmc2ybfqzgkaeilm.onion
Admin servers
Screen