Inside Cryptowall 2.0 Ransomware Secure Hunter

An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.
Threatpost | The first stop for security news
Secure Hunter Anti -Malware