Home Malware Programs Ransomware VindowsLocker Ransomware

VindowsLocker Ransomware

Posted: November 22, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 83
First Seen: November 22, 2016
OS(es) Affected: Windows

The VindowsLocker Ransomware is a Trojan that encodes your hard drive's contents with a cipher to prevent you from opening documents, pictures and other media. The predominant symptom of a VindowsLocker Ransomware infection is the ransom image it displays afterward for collecting money via a computer repair tactic. Until malware experts can confirm other details, they recommend protecting your PC with anti-malware solutions able to delete the VindowsLocker Ransomware before its attacks can launch.

A Sinister Version of Microsoft to the Rescue

While file-encrypting attacks give con artists an immediate, tangible degree of leverage over the computer users they attack, some threat actors insist on weighing their scales even further than that. One of the latest versions of the Hidden Tear malware analysts are examining, the VindowsLocker Ransomware includes social engineering tactics meant to solicit emotional panic responses and an accompanying submission to the ransom demand. As always, the decryption solution isn't automatic, and paying the VindowsLocker Ransomware's threat actors may be in vain.

The VindowsLocker Ransomware scans for files on the local machine based on their format types, including (but not necessarily limited to) PDF, DOC, PPT, XLS, TXT, JPG and PNG. When it finds any content of the above types, it encrypts them with an AES algorithm that generates a key ranging from 128 to 256 bits in length. The VindowsLocker Ransomware uploads that key to a server or remote account, thus giving the threat actor a form of collateral to initiate extortion negotiations.

The above all is what malware experts rate as being standard behavior from any version of a Hidden Tear Trojan. What makes the VindowsLocker Ransomware unusual is the approach it uses with its ransom message, which claims that the file-encrypting Trojan is a variant of 'zeus' (a particularly infamous spyware program). The same text also declares that a 'level 5 microsoft [sic] support technician' will assist you with the data recovery at a premium of 349 USD.

Smiling Back at an Extortionist's Smirk on Your Monitor

The VindowsLocker Ransomware may very well be a joke program never meant for full release or deployment. Even in comparison to other Hidden Tear-based threats, many details of its ransom campaign are amateurish, such as its use of a phone number for communication purposes. Whether it's a serious threat or an intended gag, the VindowsLocker Ransomware includes all of the potentially data-destroying risks that you can see in any Hidden Tear Trojan.

Most PC users should try to remove the VindowsLocker Ransomware with appropriate anti-malware tools before attempting data recovery. For circumstances where the public decryption options for Hidden Tear are insufficient, malware experts recommend using backups less subject to being encoded by the VindowsLocker Ransomware, or other threatening software of the same kind. However, any local copies kept by Windows, by default, are not necessarily reliable.

The VindowsLocker Ransomware is a good case of how threat authors continue luring their targets after already succeeding in accomplishing most of their goals. Pausing to consider your situation and the source of the information you're reading is never a poor choice, but that's especially true for scenarios like a VindowsLocker Ransomware infection.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 864.76 KB (864768 bytes)
MD5: 682f91e3ce769a6865ecd9f2b236e83a
Detection count: 27
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: November 22, 2016
Loading...