2017-10-02 - NECURS BOTNET MALSPAM STILL PUSHING ".YKCOL" VARIANT LOCKY RANSOMWARE

NOTICE:

ASSOCIATED FILES:

NOTES:

 

EMAILS

EMAILS COLLECTED:

Read: Date/Time -- Subject -- Sending email address (spoofed)

 

TRAFFIC


Shown above:  Infection traffic filtered in Wireshark (no post-infection traffic noted).

 

PARTIAL URLS FROM THE .JS FILES TO DOWNLOAD LOCKY:

 

ASSOCIATED FILES

SHA256 HASHES FOR ATTACHMENTS:

SHA256 HASHES FOR EXTRACTED FILES:

SHA256 HASH FOR THE ONE LOCKY BINARY SAMPLE I PULLED TODAY:

 

IMAGES


Shown above:  Screenshot from an infected Windows desktop--Encrypted files all have a .ykcol file extension.

 


Shown above:  Locky Decryptor, where is looks like the ransom cost is .4 Bitcoin now.

 

Click here to return to the main page.