SYMBOLCOMMON_NAMEaka. SYNONYMS
win.pylocky (Back to overview)

PyLocky

aka: Locky Locker
URLhaus    

PyLocky is a ransomware that tries to pass off as Locky in its ransom note. It is written in Python and packaged with PyInstaller.

References
2020-10-26CheckpointItay Cohen, Eyal Itkin
@online{cohen:20201026:exploit:9ec173c, author = {Itay Cohen and Eyal Itkin}, title = {{Exploit Developer Spotlight: The Story of PlayBit}}, date = {2020-10-26}, organization = {Checkpoint}, url = {https://research.checkpoint.com/2020/graphology-of-an-exploit-playbit/}, language = {English}, urldate = {2020-10-27} } Exploit Developer Spotlight: The Story of PlayBit
Dyre Maze PyLocky Ramnit REvil
2020-07-14Cyborg SecurityAustin Jackson
@online{jackson:20200714:python:6b03611, author = {Austin Jackson}, title = {{PYTHON MALWARE ON THE RISE}}, date = {2020-07-14}, organization = {Cyborg Security}, url = {https://www.cyborgsecurity.com/cyborg_labs/python-malware-on-the-rise/}, language = {English}, urldate = {2020-12-23} } PYTHON MALWARE ON THE RISE
Poet RAT PyLocky SEADADDY
2019-11-06CybermalveillanceCybermalveillance
@online{cybermalveillance:20191106:outil:dfa36a5, author = {Cybermalveillance}, title = {{Outil de déchiffrement du rançongiciel (ransomware) PyLocky versions 1 et 2}}, date = {2019-11-06}, organization = {Cybermalveillance}, url = {https://www.cybermalveillance.gouv.fr/nos-articles/outil-dechiffrement-rancongiciel-ransomware-pylocky-v1-2/}, language = {French}, urldate = {2019-12-18} } Outil de déchiffrement du rançongiciel (ransomware) PyLocky versions 1 et 2
PyLocky
2019-06-13Bleeping ComputerLawrence Abrams
@online{abrams:20190613:pylocky:15be611, author = {Lawrence Abrams}, title = {{pyLocky Decryptor Released by French Authorities}}, date = {2019-06-13}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/pylocky-decryptor-released-by-french-authorities/}, language = {English}, urldate = {2019-12-20} } pyLocky Decryptor Released by French Authorities
PyLocky
2019-01-10Cisco TalosMike Bautista
@online{bautista:20190110:pylocky:92bf2fc, author = {Mike Bautista}, title = {{Pylocky Unlocked: Cisco Talos releases PyLocky ransomware decryptor}}, date = {2019-01-10}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2019/01/pylocky-unlocked-cisco-talos-releases.html}, language = {English}, urldate = {2019-10-15} } Pylocky Unlocked: Cisco Talos releases PyLocky ransomware decryptor
PyLocky
2018-09-10Trend MicroIan Kenefick
@online{kenefick:20180910:closer:b2e9b2a, author = {Ian Kenefick}, title = {{A Closer Look at the Locky Poser, PyLocky Ransomware}}, date = {2018-09-10}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-the-locky-poser-pylocky-ransomware/}, language = {English}, urldate = {2020-01-13} } A Closer Look at the Locky Poser, PyLocky Ransomware
PyLocky
2018-09-03SensorTechForumsVentsislav Krastev
@online{krastev:20180903:lockymap:1e8c9cd, author = {Ventsislav Krastev}, title = {{.lockymap Files Virus (PyLocky Ransomware) – Remove and Restore Data}}, date = {2018-09-03}, organization = {SensorTechForums}, url = {https://sensorstechforum.com/lockymap-files-virus-pylocky-ransomware-remove-restore-data/}, language = {English}, urldate = {2020-01-13} } .lockymap Files Virus (PyLocky Ransomware) – Remove and Restore Data
PyLocky
2018-08-03CERT-EMCERT-EM
@online{certem:20180803:certfr:65e03cf, author = {CERT-EM}, title = {{CERT-FR ALERT BULLETIN}}, date = {2018-08-03}, organization = {CERT-EM}, url = {https://www.cert.ssi.gouv.fr/alerte/CERTFR-2018-ALE-008/}, language = {French}, urldate = {2020-01-08} } CERT-FR ALERT BULLETIN
PyLocky
Yara Rules
[TLP:WHITE] win_pylocky_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_pylocky_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.pylocky"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8bc2 c1e818 331c8588224200 0fb6c2 }
            // n = 4, score = 100
            //   8bc2                 | mov                 eax, edx
            //   c1e818               | shr                 eax, 0x18
            //   331c8588224200       | xor                 ebx, dword ptr [eax*4 + 0x422288]
            //   0fb6c2               | movzx               eax, dl

        $sequence_1 = { 0f84e8000000 8d442410 50 ff15???????? 83c404 }
            // n = 5, score = 100
            //   0f84e8000000         | je                  0xee
            //   8d442410             | lea                 eax, [esp + 0x10]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   83c404               | add                 esp, 4

        $sequence_2 = { 8944241c 6800100000 56 e8???????? 83c410 }
            // n = 5, score = 100
            //   8944241c             | mov                 dword ptr [esp + 0x1c], eax
            //   6800100000           | push                0x1000
            //   56                   | push                esi
            //   e8????????           |                     
            //   83c410               | add                 esp, 0x10

        $sequence_3 = { 57 8db8e8a34300 57 ff15???????? ff0d???????? 83ef18 83ee01 }
            // n = 7, score = 100
            //   57                   | push                edi
            //   8db8e8a34300         | lea                 edi, [eax + 0x43a3e8]
            //   57                   | push                edi
            //   ff15????????         |                     
            //   ff0d????????         |                     
            //   83ef18               | sub                 edi, 0x18
            //   83ee01               | sub                 esi, 1

        $sequence_4 = { e8???????? 83c408 85c0 75b6 56 57 e8???????? }
            // n = 7, score = 100
            //   e8????????           |                     
            //   83c408               | add                 esp, 8
            //   85c0                 | test                eax, eax
            //   75b6                 | jne                 0xffffffb8
            //   56                   | push                esi
            //   57                   | push                edi
            //   e8????????           |                     

        $sequence_5 = { 83e63f c1f806 6bce30 8945f4 8b048510a14300 894df0 }
            // n = 6, score = 100
            //   83e63f               | and                 esi, 0x3f
            //   c1f806               | sar                 eax, 6
            //   6bce30               | imul                ecx, esi, 0x30
            //   8945f4               | mov                 dword ptr [ebp - 0xc], eax
            //   8b048510a14300       | mov                 eax, dword ptr [eax*4 + 0x43a110]
            //   894df0               | mov                 dword ptr [ebp - 0x10], ecx

        $sequence_6 = { 894634 85c0 7505 8bc7 }
            // n = 4, score = 100
            //   894634               | mov                 dword ptr [esi + 0x34], eax
            //   85c0                 | test                eax, eax
            //   7505                 | jne                 7
            //   8bc7                 | mov                 eax, edi

        $sequence_7 = { ff75f4 56 e8???????? 83c40c 57 e8???????? 59 }
            // n = 7, score = 100
            //   ff75f4               | push                dword ptr [ebp - 0xc]
            //   56                   | push                esi
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   57                   | push                edi
            //   e8????????           |                     
            //   59                   | pop                 ecx

    condition:
        7 of them and filesize < 626688
}
Download all Yara Rules