As with many other forms of RansomWare, Crpt0Locker is most often delivered by way of seemingly legitimate emails. Sometimes disguised as coming from reputable sources such as FedEx, DHL, etc these emails claim to contain shipping tracking info, invoices and the likes. They often appear to be safe enough to many users who ultimately open the email and download the attachment.
This virus can create dedicated encrypted directories with files that contain prefixes such as .encrypted or .enc. They commonly include DECRYTP_INSTRUCTIONS.html and DECRYPT_INSTRUCTIONS.txt files that contain instructions on how to pay the ransom. This virus also requires the user to download the Tor browser for further instructions on obtaining the decryption key.
It is strongly advised that you do not pay any ransom demand. But instead contact RansomRescue immediately. When paying these ransoms, people and businesses are inadvertently sustaining this unscrupulous business models (yes RansomWare has become a business model!) and allowing them to flourish and continue infecting and disrupting the business world.