Home Malware Programs Ransomware File-Locker Ransomware

File-Locker Ransomware

Posted: December 28, 2017

Threat Metric

Threat Level: 6/10
Infected PCs: 17
First Seen: February 9, 2023
Last Seen: March 31, 2023
OS(es) Affected: Windows

The File-Locker Ransomware is a Trojan that uses Hidden Tear-based encryption to prevent you from opening your media, such as pictures or text documents. Its attacks include Korean-English messages that ask for Bitcoin payments in return for a decryption service, although malware researchers find it likely that other, free retrieval methods are possible. Ignoring the ransom instructions, when practical, and allowing a dedicated anti-malware product to uninstall the File-Locker Ransomware is encouraged for your PC's security.

Hidden Tear Gives a Little Attention to Korea

A majority of file-blocking Trojan campaigns occur in Europe and North America, but other regions of the world, particularly other industrialized nations, also aren't ignorable as valuable targets for data hostage-taking attacks. Most families of file-locker Trojans don't include significant features specific to particular countries, and Hidden Tear, for instance, needs a few changes to be suitable for attacking places like Germany, Canada or South Korea. The latter target is the choice of the File-Locker Ransomware's campaign.

Malware researchers identified this threat only recently, which uses a slightly more basic encryption attack and, in other respects, a traditional payload that consists of appending extensions to hostage media and creating ransom messages for the victims to read. The File-Locker Ransomware uses the AES as its cipher for locking the user's files, which it runs as an invisible background process, converting the internal data into a format that's unreadable to most, other programs. Choices of files that the File-Locker Ransomware may block will exclude your OS components but can include Word documents, Excel spreadsheets, JPG or GIF pictures, MPEG movies and others.

The File-Locker Ransomware places a '.locked' extension at the end of the names of all these files, which is a feature it shares with other Trojans of the same class, including both Hidden Tear and non-HT threats like the Evasive Ransomware, the Satan's Doom Ransomware, the CyberDrill Ransomware, the Stampado Ransomware and the UpdateHost Ransomware. Then, it creates Notepad text files that include Korean and English copies of the same ransom note, which asks for a Bitcoin payment (equal to 50,000 won or 47 USD) for the threat actor's decryption help. The builds of the File-Locker Ransomware that are available to malware experts show no other symptoms, such as wallpaper-hijackings or lock-screen behavior.

The Shallowest Version of Hidden Tear Yet

The File-Locker Ransomware is, externally, very similar to other versions of Hidden Tear, both Korean-based and otherwise. However, its attacks include a vital difference: a hard-coded key to its cipher, which lacks any dynamic, per-install changes. With this key ('dnwls07193147'), anti-malware researchers could develop a free decryption tool for unlocking any of the media that this Trojan encrypts. Since most versions of Hidden Tear use more secure encoding mechanisms than this, malware researchers still emphasize backing up content, as well.

Many file-locker Trojans install themselves via e-mail messages that can include attached, corrupted documents, or disguised Trojan droppers like Trojan.Zlob. Other, inexpensive campaigns like the File-Locker Ransomware's attacks, carry themselves to random targets by hiding on file-sharing networks or pirated media-themed websites. Most active and updated anti-malware solutions should catch and remove the File-Locker Ransomware by default, and interrupt its payload.

Any users racing to pay the File-Locker Ransomware's ransom are making an enormous mistake to recover their files at a pointless asking price. Since the File-Locker Ransomware has no timing limits or other mechanisms for persuading its victims into taking quick, self-destructive actions, no one has an adequate excuse for not pausing to consider every solution possible for an infection.

Loading...