• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Ransomware  /  Analysis of recent Locky ransomware outbreak
Analysis of recent Locky ransomware outbreak
30 September 2017

Analysis of recent Locky ransomware outbreak

Written by Ankita Ashesh
Ankita Ashesh
Cybersecurity, Ransomware
260
Shares
1

Quick Heal Security Labs has been observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new variant of Locky ransomware started. The observed commonality in this campaign was the attachments ended with ‘.7z’ extension. After 26th September, we started seeing many such instances and soon it turned out to be a major outbreak. Let’s take a look at some of the important aspects of this campaign.

Infection Chain

A typical infection chain starts with spam email. Below is one such spam email used in this campaign,

1

Fig 1: Spam e-mail with malicious ‘Invoice’ as an attachment

Few subject names and attachment observed are,

Subject Names:-

  • Invoice PIS7316453
  • 03_Invoice_7137

Attachment Names:-

  • InvoicePIS7316453_7z.ANTIVIRUS-34287
  • 001_4410.7z

As it can be seen from above, the subject names and attachments are different in every spam e-mail. This is generally done by attackers in order to evade the detection by security products.

The common thing between these emails is the attachments with .7z extensions which contains the malicious VBS file which downloads and launches the ransomware payload.

This variant is almost identical with the other Locky ransomware variants functionality wise with the only exception of the extension used by it for encrypted files. The extension used this time turned out to be an interesting one. It just reversed the previous well-known extension ‘.locky’ to ‘.ykcol’. Below is the screen-shot of the Locky ransom screen.

2

Fig 2: Locky Ransom screen

Also below HTML file with the same messages is dropped on the root of every drive.

3

Fig 3: Locky ransom HTML message

Currently there is no decryptor available for any of the Locky ransomware encrypted files and this new version of Locky is no exception to it.

Quick Heal and Seqrite products provide protection against this outbreak of Locky ransomware through its multi-layered security offering.

Indicator of Compromise

  • b035ddc1f0738c3f90cb5c0b804e1775
  • efdb6033dccf27fe103b8fc13bc4f2d7

Subject Matter Experts

Shalaka Patil|Swapnil Nigade|Shriram Munde

Quick Heal Security Labs

 Previous PostCybersecurity News Rundown September 2017
Next Post  Attacks on SSL are on the rise: Know more who is hiding in your e...
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies