Threat Database Ransomware File-locker Ransomware

File-locker Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 11
First Seen: March 1, 2017
Last Seen: January 20, 2023
OS(es) Affected: Windows

The File-locker Ransomware is an encryption ransomware Trojan that is used to lock the victims' files with a strong encryption method. Once the File-locker Ransomware has made the victim's files inaccessible, the File-locker Ransomware will demand a fee to provide the decryption key, that is the only tool that can restore the affected files. The File-locker Ransomware is designed to target computer users in Korea, demanding a ransom payment of 50 thousand Won, which is equivalent to approximately 47 USD. Although the File-locker Ransomware's ransom demand is lower than most encryption ransomware Trojans that are active currently, PC security researchers advise PC users to refrain from paying the ransom associated with the File-locker Ransomware or contacting the people responsible for this attack.

Protecting Your Computer from the File-locker Ransomware and Similar Threats

The best way to prevent the File-locker Ransomware attacks and similar infections is to be cautious when browsing the Web. Unsolicited file attachments, generally attached to spam email messages, are a prime way of distributing these threats and should be evaded at all costs. Fake file downloads also are a common source of these infections, and computer users should take steps to ensure that their computers are protected adequately, and software and other files are only downloaded from reputable sources. While anti-malware software and file backups are of vital importance in making sure that your computer does not fall prey to threats like the File-locker Ransomware, being cautious when browsing the Web remains the most effective way of keeping your computer safe from these threats.

How the File-locker Ransomware File-locker Ransomware Infection Works

After the File-locker Ransomware has encrypted the victim's files, it will display its ransom note in the form of a text file named 'Warning!!!!!!.txt.' The full text of this file is displayed in Korean and English, and reads as follows:

'한국어: 경고!!! 모든 문서, 사진, 데이테베이스 및 기타 중요한 파일이 암호화되었습니다!!
당신은 돈을 지불해야 합니다
비트코인 5만원을 fasfry2323@naver.com로 보내십시오 비트코인 지불코드: 1F1tAaz5x1HUXrCNLbtMDqcw6o5GNn4xqX 결제 사이트 hxxp://www.localbitcoins.com/
English: Warning!!! All your documents, photos, databases and other important personal files were encrypted!!
You have to pay for it.
Send fifty thousand won to fasfry2323@naver.com Bitcoin payment code: 1BoatSLRHtKNngkdXEeobR76b53LETtpyT Payment site hxxp://www.localbitcoins.com/'

The File-locker Ransomware uses a strong encryption algorithm in its attack, to make the victim's files completely inaccessible. The File-locker Ransomware will target the user-generated files. The File-locker Ransomware may encrypt the files that have the following file extensions:

.txt, .doc, .docx, .xls, .index, .pdf, .zip, .rar, .css, .lnk, .xlsx, .ppt, .pptx, .odt, .jpg, .bmp, .png, .csv, .sql, .mdb, .sln, .php, .asp, .aspx, .html, .xml, .psd, .bk, .bat, .mp3, .mp4, .wav, .wma, .avi, .divx, .mkv, .mpeg, .wmv, .mov, .ogg, .java, .csv, .kdc, .dxg, .xlsm, .pps, .cpp, .odt, .php, .odc, .log, .exe, .cr2, .mpeg, .jpeg, .xqx, .dotx, .pps, .class, .jar, .psd, .pot, .cmd, .rtf, .csv, .php, .docm, .xlsm, .js, .wsf, .vbs, .ini, .jpeg, .gif, .7z, .dotx, .kdc, .odm, .xll, .xlt, .ps, .mpeg, .pem, .msg, .xls, .wav, .odp, .nef, .pmd, .r3d, .dll, .reg, .hwp, .7z, .p12, .pfx, .cs, .ico, .torrent, .

The File-locker Ransomware will encrypt the affected files, changing their file extension by adding the string '.locked' to any affected files' names. Fortunately, computer users can restore their files with the password 'dnwls07193147.' This makes the File-locker Ransomware different from most ransomware Trojans, which use an attack from which computer users cannot recover. It is extremely necessary to have file backups in these cases. Fortunately, in the case of the File-locker Ransomware, computer users can easily restore access to the infected files thanks to the fact that the File-locker Ransomware uses a static password in its attack.

SpyHunter Detects & Remove File-locker Ransomware

File System Details

File-locker Ransomware may create the following file(s):
# File Name MD5 Detections
1. 22524d61c985fa4e9312ab79200ec720 22524d61c985fa4e9312ab79200ec720 0
2. 46fddea6b380e335e7b5cf995ee1a53b 46fddea6b380e335e7b5cf995ee1a53b 0

Trending

Most Viewed

Loading...