2016-05-31 - MORE LOCKY RANSOMWARE (ALWAYS MORE LOCKY)

NOTICE:

ASSOCIATED FILES:

  • 2016-05-31-Locky-ransomawre-infection-after-details_V9yGF.js.pcap   (157,924 bytes)
  • 2016-05-31-Locky-ransomawre-infection-after-details_gyo4a.js.pcap   (193,258 bytes)
  • 2016-05-31-Locky-ransomawre-infection-after-doc_scan_GKnaA.js.pcap   (219,064 bytes)
  • 2016-05-31-Locky-ransomawre-infection-after-scan_k9w7fm.js.pcap   (219,207 bytes)
  • 2016-05-31-Locky-ransomware-email-tracker.csv   (659 bytes)
  • files-from-an-infected-host/2016-05-31-Locky-ransomware-example.exe   (181,760 bytes)
  • files-from-an-infected-host/2016-05-31-Locky-ransomware_HELP_instructions.bmp   (3,293,774 bytes)
  • files-from-an-infected-host/2016-05-31-Locky-ransomware_HELP_instructions.html   (9,355 bytes)
  • email-attachments/caution_trevor_54614652.zip   (5,879 bytes)
  • email-attachments/copy_alan_14149553.zip   (5,897 bytes)
  • email-attachments/report_56098446.zip   (5,864 bytes)
  • email-attachments/security_69514117.zip   (5,772 bytes)
  • email-examples/2016-05-31-email-for-Locky-ransomware-0926-UTC.eml   (9,914 bytes)
  • email-examples/2016-05-31-email-for-Locky-ransomware-0956-UTC.eml   (9,928 bytes)
  • email-examples/2016-05-31-email-for-Locky-ransomware-1134-UTC.eml   (9,657 bytes)
  • email-examples/2016-05-31-email-for-Locky-ransomware-1158-UTC.eml   (9,515 bytes)
  • files-extracted-from-email-attachments/details_V9yGF.js   (13,028 bytes)
  • files-extracted-from-email-attachments/details_gyo4a.js   (12,965 bytes)
  • files-extracted-from-email-attachments/doc_scan_GKnaA.js   (12,812 bytes)
  • files-extracted-from-email-attachments/scan_k9w7fm.js   (11,918 bytes)

 

EMAILS AND ATTACHMENTS


Shown above:  Data from the .csv spreadsheet on 4 email samples from Tuesday 2016-05-31.

 


Shown above:  Example of Fraudlent Behavior - Account Suspended email from
Tuesday 2016-05-31.

 


Shown above:  Example of New Message from your bank manager email from
Tuesday 2016-05-31.

 

TRAFFIC


Shown above:  Locky ransomware infection traffic generated from the first email attachment filtered in Wireshark.

 


Shown above:  Locky ransomware infection traffic generated from the second email attachment filtered in Wireshark.

 


Shown above:  Locky ransomware infection traffic generated from the third email attackment filtered in Wireshark.

 


Shown above:  Locky ransomware infection traffic generated from the fourth email attachment filtered in Wireshark.

 

HTTP REQUESTS FORM .JS FILES TO DOWNLOAD THE LOCKY RANSOMWARE EXE:

POST-INFECTION TRAFFIC FROM THE LOCKY RANSOMWARE EXE:

 

IMAGES


Shown above:  Windows computer's desktop after one of today's Locky ransomware infections.

 

Click here to return to the main page.