SYMBOLCOMMON_NAMEaka. SYNONYMS
win.locky (Back to overview)

Locky

Actor(s): TA505

URLhaus    

Locky is a high profile ransomware family that first appeared in early 2016 and was observed being active until end of 2017. It encrypts files on the victim system and asks for ransom in order to have back original files. In its first version it added a .locky extension to the encrypted files, and in recent versions it added the .lukitus extension. The ransom amount is defined in BTC and depends on the actor.

References
2021-10-05Trend MicroFyodor Yarochkin, Janus Agcaoili, Byron Gelera, Nikko Tamana
@online{yarochkin:20211005:ransomware:e5f5375, author = {Fyodor Yarochkin and Janus Agcaoili and Byron Gelera and Nikko Tamana}, title = {{Ransomware as a Service: Enabler of Widespread Attacks}}, date = {2021-10-05}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-as-a-service-enabler-of-widespread-attacks}, language = {English}, urldate = {2021-10-20} } Ransomware as a Service: Enabler of Widespread Attacks
Cerber Conti DarkSide Gandcrab Locky Nefilim REvil Ryuk
2020-08-20CERT-FRCERT-FR
@techreport{certfr:20200820:development:d518522, author = {CERT-FR}, title = {{Development of the Activity of the TA505 Cybercriminal Group}}, date = {2020-08-20}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-009.pdf}, language = {English}, urldate = {2020-08-28} } Development of the Activity of the TA505 Cybercriminal Group
AndroMut Bart Clop Dridex FlawedAmmyy FlawedGrace Get2 Locky Marap QuantLoader SDBbot ServHelper tRat TrickBot
2020-07-29ESET Researchwelivesecurity
@techreport{welivesecurity:20200729:threat:496355c, author = {welivesecurity}, title = {{THREAT REPORT Q2 2020}}, date = {2020-07-29}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf}, language = {English}, urldate = {2020-07-30} } THREAT REPORT Q2 2020
DEFENSOR ID HiddenAd Bundlore Pirrit Agent.BTZ Cerber ClipBanker CROSSWALK Cryptowall CTB Locker DanaBot Dharma Formbook Gandcrab Grandoreiro Houdini ISFB LockBit Locky Mailto Maze Microcin Nemty NjRAT Phobos PlugX Pony REvil Socelars STOP Tinba TrickBot WannaCryptor
2020-06-22CERT-FRCERT-FR
@techreport{certfr:20200622:volution:fba1cfa, author = {CERT-FR}, title = {{Évolution De Lactivité du Groupe Cybercriminel TA505}}, date = {2020-06-22}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf}, language = {French}, urldate = {2020-06-24} } Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2020-05-21Intel 471Intel 471
@online{471:20200521:brief:048d164, author = {Intel 471}, title = {{A brief history of TA505}}, date = {2020-05-21}, organization = {Intel 471}, url = {https://blog.intel471.com/2020/05/21/a-brief-history-of-ta505/}, language = {English}, urldate = {2020-05-23} } A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
2020-05-18ThreatpostTara Seals
@online{seals:20200518:ransomware:265e1f4, author = {Tara Seals}, title = {{Ransomware Gang Arrested for Spreading Locky to Hospitals}}, date = {2020-05-18}, organization = {Threatpost}, url = {https://threatpost.com/ransomware-gang-arrested-locky-hospitals/155842/}, language = {English}, urldate = {2020-07-06} } Ransomware Gang Arrested for Spreading Locky to Hospitals
Locky
2020-02-10viXraJason Reaves
@techreport{reaves:20200210:case:3f668be, author = {Jason Reaves}, title = {{A Case Study into solving Crypters/Packers in Malware Obfuscation using an SMT approach}}, date = {2020-02-10}, institution = {viXra}, url = {https://vixra.org/pdf/2002.0183v1.pdf}, language = {English}, urldate = {2020-02-27} } A Case Study into solving Crypters/Packers in Malware Obfuscation using an SMT approach
Locky
2019-09-09McAfeeThomas Roccia, Marc Rivero López, Chintan Shah
@online{roccia:20190909:evolution:baf3b6c, author = {Thomas Roccia and Marc Rivero López and Chintan Shah}, title = {{Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study}}, date = {2019-09-09}, organization = {McAfee}, url = {https://www.mcafee.com/blogs/other-blogs/mcafee-labs/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study/}, language = {English}, urldate = {2020-08-30} } Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Cutwail Dridex Dyre Kovter Locky Phorpiex Simda
2019-07-30Dissecting MalwareMarius Genheimer
@online{genheimer:20190730:picking:cea78ea, author = {Marius Genheimer}, title = {{Picking Locky}}, date = {2019-07-30}, organization = {Dissecting Malware}, url = {https://dissectingmalwa.re/picking-locky.html}, language = {English}, urldate = {2020-03-27} } Picking Locky
Locky
2018-07-26IEEE Symposium on Security and Privacy (SP)Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Kylie McRoberts, Elie Bursztein, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy
@techreport{huang:20180726:tracking:b51d0ee, author = {Danny Yuxing Huang and Maxwell Matthaios Aliapoulios and Vector Guo Li and Luca Invernizzi and Kylie McRoberts and Elie Bursztein and Jonathan Levin and Kirill Levchenko and Alex C. Snoeren and Damon McCoy}, title = {{Tracking Ransomware End-to-end}}, date = {2018-07-26}, institution = {IEEE Symposium on Security and Privacy (SP)}, url = {https://storage.googleapis.com/pub-tools-public-publication-data/pdf/ce44cbda9fdc061050c1d2a5dec0270874a9dc85.pdf}, language = {English}, urldate = {2021-04-16} } Tracking Ransomware End-to-end
Cerber Locky WannaCryptor
2018-03-20StormshieldMehdi Talbi
@online{talbi:20180320:deobfuscating:7ac7605, author = {Mehdi Talbi}, title = {{De-obfuscating Jump Chains with Binary Ninja}}, date = {2018-03-20}, organization = {Stormshield}, url = {https://thisissecurity.stormshield.com/2018/03/20/de-obfuscating-jump-chains-with-binary-ninja/}, language = {English}, urldate = {2020-03-16} } De-obfuscating Jump Chains with Binary Ninja
Locky
2017-11-07ThreatVectorCylance Threat Research Team
@online{team:20171107:locky:a38e9b5, author = {Cylance Threat Research Team}, title = {{Locky Ransomware}}, date = {2017-11-07}, organization = {ThreatVector}, url = {https://www.cylance.com/en_us/blog/threat-spotlight-locky-ransomware.html}, language = {English}, urldate = {2020-01-07} } Locky Ransomware
Locky
2017-08-20MyOnlineSecurityMyOnlineSecurity
@online{myonlinesecurity:20170820:return:cf54ed9, author = {MyOnlineSecurity}, title = {{return of fake UPS cannot deliver malspam with an updated nemucod ransomware and Kovter payload}}, date = {2017-08-20}, organization = {MyOnlineSecurity}, url = {http://web.archive.org/web/20181007211751/https://myonlinesecurity.co.uk/return-of-fake-ups-cannot-deliver-malspam-with-an-updated-nemucod-ransomware-and-kovter-payload/}, language = {English}, urldate = {2020-11-26} } return of fake UPS cannot deliver malspam with an updated nemucod ransomware and Kovter payload
Cold$eal Locky
2017-08-16Bleeping ComputerLawrence Abrams
@online{abrams:20170816:locky:7445bd0, author = {Lawrence Abrams}, title = {{Locky Ransomware switches to the Lukitus extension for Encrypted Files}}, date = {2017-08-16}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/}, language = {English}, urldate = {2019-12-20} } Locky Ransomware switches to the Lukitus extension for Encrypted Files
Locky
2017-08-10botfrei BlogTom Berchem
@online{berchem:20170810:weltweite:5df6bfa, author = {Tom Berchem}, title = {{Weltweite Spamwelle verbreitet teuflische Variante des Locky}}, date = {2017-08-10}, organization = {botfrei Blog}, url = {https://blog.botfrei.de/2017/08/weltweite-spamwelle-verbreitet-teufliche-variante-des-locky/}, language = {German}, urldate = {2019-12-10} } Weltweite Spamwelle verbreitet teuflische Variante des Locky
Locky
2017-07-18ElasticAshkan Hosseini
@online{hosseini:20170718:ten:af036b3, author = {Ashkan Hosseini}, title = {{Ten process injection techniques: A technical survey of common and trending process injection techniques}}, date = {2017-07-18}, organization = {Elastic}, url = {https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process}, language = {English}, urldate = {2020-07-15} } Ten process injection techniques: A technical survey of common and trending process injection techniques
Cryakl CyberGate Dridex FinFisher RAT Locky
2017-06-22Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20170622:locky:4a088f0, author = {Catalin Cimpanu}, title = {{Locky Ransomware Returns, but Targets Only Windows XP & Vista}}, date = {2017-06-22}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/locky-ransomware-returns-but-targets-only-windows-xp-and-vista/}, language = {English}, urldate = {2019-12-20} } Locky Ransomware Returns, but Targets Only Windows XP & Vista
Locky
2017-06-21CiscoAlex Chiu, Warren Mercer, Jaeson Schultz, Sean Baird, Matthew Molyett
@online{chiu:20170621:player:b44064a, author = {Alex Chiu and Warren Mercer and Jaeson Schultz and Sean Baird and Matthew Molyett}, title = {{Player 1 Limps Back Into the Ring - Hello again, Locky!}}, date = {2017-06-21}, organization = {Cisco}, url = {http://blog.talosintelligence.com/2017/06/necurs-locky-campaign.html}, language = {English}, urldate = {2019-12-17} } Player 1 Limps Back Into the Ring - Hello again, Locky!
Locky
2017-01-31MalwarebytesMalwarebytes Labs
@online{labs:20170131:locky:92db484, author = {Malwarebytes Labs}, title = {{Locky Bart ransomware and backend server analysis}}, date = {2017-01-31}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/01/locky-bart-ransomware-and-backend-server-analysis/}, language = {English}, urldate = {2019-12-20} } Locky Bart ransomware and backend server analysis
Locky
2016-07-07Pierluigi Paganini
@online{paganini:20160707:new:7c765a2, author = {Pierluigi Paganini}, title = {{New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the recent Locky Ransomware.}}, date = {2016-07-07}, url = {http://securityaffairs.co/wordpress/49094/malware/zepto-ransomware.html}, language = {English}, urldate = {2019-11-22} } New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the recent Locky Ransomware.
Locky
2016-03-01Malwarebyteshasherezade
@online{hasherezade:20160301:look:fe35696, author = {hasherezade}, title = {{Look Into Locky Ransomware}}, date = {2016-03-01}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2016/03/look-into-locky/}, language = {English}, urldate = {2019-12-20} } Look Into Locky Ransomware
Locky
Yara Rules
[TLP:WHITE] win_locky_auto (20211008 | Detects win.locky.)
rule win_locky_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2021-10-07"
        version = "1"
        description = "Detects win.locky."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.locky"
        malpedia_rule_date = "20211007"
        malpedia_hash = "e5b790e0f888f252d49063a1251ca60ec2832535"
        malpedia_version = "20211008"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c9 c20800 55 8bec 51 51 83781408 }
            // n = 7, score = 2100
            //   c9                   | leave               
            //   c20800               | ret                 8
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   51                   | push                ecx
            //   51                   | push                ecx
            //   83781408             | cmp                 dword ptr [eax + 0x14], 8

        $sequence_1 = { 8bfb 8975fc eb1b 8b461c 8b4f1c 3bc8 }
            // n = 6, score = 2100
            //   8bfb                 | mov                 edi, ebx
            //   8975fc               | mov                 dword ptr [ebp - 4], esi
            //   eb1b                 | jmp                 0x1d
            //   8b461c               | mov                 eax, dword ptr [esi + 0x1c]
            //   8b4f1c               | mov                 ecx, dword ptr [edi + 0x1c]
            //   3bc8                 | cmp                 ecx, eax

        $sequence_2 = { 8d45cc 50 51 c745cc28000000 ff15???????? 85c0 }
            // n = 6, score = 2100
            //   8d45cc               | lea                 eax, dword ptr [ebp - 0x34]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   c745cc28000000       | mov                 dword ptr [ebp - 0x34], 0x28
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax

        $sequence_3 = { 8d463c 894604 8d465c 894610 33c0 66894618 }
            // n = 6, score = 2100
            //   8d463c               | lea                 eax, dword ptr [esi + 0x3c]
            //   894604               | mov                 dword ptr [esi + 4], eax
            //   8d465c               | lea                 eax, dword ptr [esi + 0x5c]
            //   894610               | mov                 dword ptr [esi + 0x10], eax
            //   33c0                 | xor                 eax, eax
            //   66894618             | mov                 word ptr [esi + 0x18], ax

        $sequence_4 = { 8bc6 c9 c3 ff15???????? 8945fc 68???????? }
            // n = 6, score = 2100
            //   8bc6                 | mov                 eax, esi
            //   c9                   | leave               
            //   c3                   | ret                 
            //   ff15????????         |                     
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   68????????           |                     

        $sequence_5 = { 57 8d75d4 e8???????? 8365fc00 8d759c }
            // n = 5, score = 2100
            //   57                   | push                edi
            //   8d75d4               | lea                 esi, dword ptr [ebp - 0x2c]
            //   e8????????           |                     
            //   8365fc00             | and                 dword ptr [ebp - 4], 0
            //   8d759c               | lea                 esi, dword ptr [ebp - 0x64]

        $sequence_6 = { 0faf459c 83c01f 83e0e0 99 83e207 8d3c02 }
            // n = 6, score = 2100
            //   0faf459c             | imul                eax, dword ptr [ebp - 0x64]
            //   83c01f               | add                 eax, 0x1f
            //   83e0e0               | and                 eax, 0xffffffe0
            //   99                   | cdq                 
            //   83e207               | and                 edx, 7
            //   8d3c02               | lea                 edi, dword ptr [edx + eax]

        $sequence_7 = { 6800ff0000 89b55cffffff 89b560ffffff 898568ffffff ffd7 8bf8 897de0 }
            // n = 7, score = 2100
            //   6800ff0000           | push                0xff00
            //   89b55cffffff         | mov                 dword ptr [ebp - 0xa4], esi
            //   89b560ffffff         | mov                 dword ptr [ebp - 0xa0], esi
            //   898568ffffff         | mov                 dword ptr [ebp - 0x98], eax
            //   ffd7                 | call                edi
            //   8bf8                 | mov                 edi, eax
            //   897de0               | mov                 dword ptr [ebp - 0x20], edi

        $sequence_8 = { 5b c21000 e9???????? 8bff 55 8bec }
            // n = 6, score = 1400
            //   5b                   | pop                 ebx
            //   c21000               | ret                 0x10
            //   e9????????           |                     
            //   8bff                 | mov                 edi, edi
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp

        $sequence_9 = { 03d8 8b442408 f7e1 03d3 5b c21000 e9???????? }
            // n = 7, score = 1400
            //   03d8                 | add                 ebx, eax
            //   8b442408             | mov                 eax, dword ptr [esp + 8]
            //   f7e1                 | mul                 ecx
            //   03d3                 | add                 edx, ebx
            //   5b                   | pop                 ebx
            //   c21000               | ret                 0x10
            //   e9????????           |                     

        $sequence_10 = { 8bc6 5e c21000 8bff 55 8bec 8b4514 }
            // n = 7, score = 1000
            //   8bc6                 | mov                 eax, esi
            //   5e                   | pop                 esi
            //   c21000               | ret                 0x10
            //   8bff                 | mov                 edi, edi
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   8b4514               | mov                 eax, dword ptr [ebp + 0x14]

        $sequence_11 = { 55 e9???????? 90 8d00 }
            // n = 4, score = 700
            //   55                   | push                ebp
            //   e9????????           |                     
            //   90                   | nop                 
            //   8d00                 | lea                 eax, dword ptr [eax]

        $sequence_12 = { 56 90 e9???????? 8d3f }
            // n = 4, score = 700
            //   56                   | push                esi
            //   90                   | nop                 
            //   e9????????           |                     
            //   8d3f                 | lea                 edi, dword ptr [edi]

        $sequence_13 = { 31c0 90 e9???????? 90 58 90 e9???????? }
            // n = 7, score = 700
            //   31c0                 | xor                 eax, eax
            //   90                   | nop                 
            //   e9????????           |                     
            //   90                   | nop                 
            //   58                   | pop                 eax
            //   90                   | nop                 
            //   e9????????           |                     

        $sequence_14 = { 58 90 e9???????? 90 6a61 e9???????? }
            // n = 6, score = 700
            //   58                   | pop                 eax
            //   90                   | nop                 
            //   e9????????           |                     
            //   90                   | nop                 
            //   6a61                 | push                0x61
            //   e9????????           |                     

        $sequence_15 = { ebf0 90 8d00 90 }
            // n = 4, score = 700
            //   ebf0                 | jmp                 0xfffffff2
            //   90                   | nop                 
            //   8d00                 | lea                 eax, dword ptr [eax]
            //   90                   | nop                 

        $sequence_16 = { 57 e9???????? 90 8d09 }
            // n = 4, score = 700
            //   57                   | push                edi
            //   e9????????           |                     
            //   90                   | nop                 
            //   8d09                 | lea                 ecx, dword ptr [ecx]

    condition:
        7 of them and filesize < 1122304
}
Download all Yara Rules