Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

PyLocky Ransomware (.locky)

  • Distribution Method : Download the file via a link included in the email message
  • MD5 : 7feb43da4aefced9f64a058a385de416
  • Major Detection Name : Ransomware-Locky (McAfee), Ransom_PYLOCKY.B (Trend Micro)
  • Encrypted File Pattern : .locky
  • Malicious File Creation Location :
     - C:\Users\%UserName%\AppData\Local\Temp\is-<Random>.tmp\lock.exe
     - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOCKY-README.txt
  • Payment Instruction File : <Original Filename>.<Original Extension> / LOCKY-README.txt
  • Major Characteristics :
     - Python-based Ransomware
     - "LA CREM LTD" with digital signatures
     - The English, Italian, French and Korean users targeted