- Distribution Method : Download the file via a link included in the email message
- MD5 : 7feb43da4aefced9f64a058a385de416
- Major Detection Name : Ransomware-Locky (McAfee), Ransom_PYLOCKY.B (Trend Micro)
- Encrypted File Pattern : .locky
- Malicious File Creation Location :
- C:\Users\%UserName%\AppData\Local\Temp\is-<Random>.tmp\lock.exe
- C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOCKY-README.txt
- Payment Instruction File : <Original Filename>.<Original Extension> / LOCKY-README.txt
- Major Characteristics :
- Python-based Ransomware
- "LA CREM LTD" with digital signatures
- The English, Italian, French and Korean users targeted
List