Malware News Locky Adds Support for a New "S**T" Extension

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Security researcher MalwareHunterTeam tells Softpedia that the infamous Locky ransomware has returned today with a new spam campaign that's spreading a new version of the ransomware.

Last week, Microsoft's Malware Protection Center had revealed that the group behind Locky had reduced its spam efforts and was testing a new distribution method that relied on small spam campaigns spreading booby-trapped LNK (shortcut) files.

Over the weekend, Locky's creators have returned to their old tricks, and are in the midst of a massive spam campaign that spread zipped HTA, WSF, and JS files, which are Locky's classic infection methods. An analysis of the email lures used for this spam campaign is available via My Online Security.

Locky pushes out new file encryption extension
The most visible change in this version of Locky is the extension it appends at the end of encrypted files.

The new extension is #####, and this is not the only thing salacious detail observed by researchers, who say the ransomware calls back home, to a server file named "linuxsucks.php."

For example, a file named photo.png would become [random_characters].#####. Previously Locky had used extensions such as LOCKY, ZEPTO, and ODIN.

As for the random file names, MalwareHunterTeam said the format is "8-4-4-4-12.#####, where the first 8-4-4 characters are unique for infection, and the last 4-12 is unique for the file."

Read more: Locky Adds Support for a New "S**T" Extension

Related: Video Review - Locky Ransomware adds a extension .#####!Demonstration of attack video review.
 

SHvFl

Level 35
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Nov 19, 2014
2,350
The lil bastage does not like Linux, prob tried writing one for Linux and failed :p
Bill Gates software is much easier to smash ;)
Lol this is actually not true at all. Sure in theory and the way Linux works makes it a bit harder to abuse but trust me if we all used Linux malware coders would have smashed them as easily as they do with windows.
The awesome and also sad part of malware is that the fight never stops. It's like in Tango, you need 2 to dance.
 

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Lol this is actually not true at all. Sure in theory and the way Linux works makes it a bit harder to abuse but trust me if we all used Linux malware coders would have smashed them as easily as they do with windows.
The awesome and also sad part of malware is that the fight never stops. It's like in Tango, you need 2 to dance.
I was being funny, but there are so many variants that it would not be so easy with Linux, and they are not
afraid to change some coding if needed, unlike MicroSoft.
 

SHvFl

Level 35
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Nov 19, 2014
2,350
I was being funny, but there are so many variants that it would not be so easy with Linux, and they are not
afraid to change some coding if needed, unlike MicroSoft.
If they had users in billion they would also be afraid. It's ok to do whatever you want when you only have a limited base which you know they are loyal. A change in windows security might break so make applications that half the users will not update.
Sure they can improve and they are doing it slowly but software security companies need to also eat.
 

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
Thanks for the share :)

=> I have seen some script-based downloaders that download this sample, on the Malware Vault : when I saw the "words" I asked to myself "if I make an analyse and post it, should I change these pars", hahaha
:D
 
Last edited:

soccer97

Level 11
Verified
May 22, 2014
517
The name of that extension may be the inadvertent first word coming out of people's mouth when they see all their files are encrypted.

The fact that it is referred to as .ODIN makes me wonder if it is going to be attacking or is planning to infect people downloading these Firmware flashing tools for their Android - and I think they may use them when trying to unroot their devices. Hopefully its an anomaly.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top