Categories: Ransom

Ransom.Locky.143 (file analysis)

The Ransom.Locky.143 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Locky.143 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Reads data out of its own binary image
  • A process created a hidden window
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to delete volume shadow copies
  • Installs itself for autorun at Windows startup
  • Exhibits possible ransomware file modification behavior
  • Creates a hidden or system file
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Ransom.Locky.143?


File Info:

crc32: 7C405EEDmd5: 696edc38320cdd5cea2e0fa87c2b1164name: 696EDC38320CDD5CEA2E0FA87C2B1164.mlwsha1: 88d841a2b2d8e9abbbedbc4c46f8933c7aec6e5csha256: 8b3de691ca7df5592a82e5ef2e4fdf15bc10aa5e7bb82289498e54367f37c068sha512: c0a1805602422cfe12f8599b8e674ad1aec01df8fe7d01db68de04f61c59706f8479e4fe6b26c3044fc9d5ce402ebbbc334a6f93a85edd0a80f51d5988078539ssdeep: 3072:id7658PaNWzqWrLWzZE44wwxuvyViqOas0CLE3rOh+4mDuz:47k8Phzl654wwxikfV7WG2type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2001InternalName: FlashPlayFileVersion: 0, 3, 0, 0CompanyName: StudioPrivateBuild: 1LegalTrademarks: Flash PlayComments: Author:XRH ProductName: FlashPlay ApplicationSpecialBuild: 1ProductVersion: 0, 3, 0, 0FileDescription: Flash Player UtilityOriginalFilename: FlashPlay.EXETranslation: 0x0409 0x04b0

Ransom.Locky.143 also known as:

K7AntiVirus Trojan ( 0050bc621 )
Elastic malicious (high confidence)
DrWeb Trojan.Encoder.3976
Cynet Malicious (score: 100)
ALYac Gen:Variant.Ransom.Locky.143
Cylance Unsafe
Zillya Trojan.Banker.Win32.110458
Sangfor Trojan.Win32.Generic.5
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Ransom:Win32/Spora.d3670be0
K7GW Trojan ( 0050bc621 )
Cybereason malicious.8320cd
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Injector.DNYE
Zoner Trojan.Win32.56525
APEX Malicious
Avast Win32:Rootkit-gen [Rtk]
ClamAV Win.Trojan.Yakes-7008632-0
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Gen:Variant.Ransom.Locky.143
NANO-Antivirus Trojan.Win32.Inject.enuioz
MicroWorld-eScan Gen:Variant.Ransom.Locky.143
Tencent Malware.Win32.Gencirc.114a442d
Ad-Aware Gen:Variant.Ransom.Locky.143
Sophos Mal/Generic-S
Comodo Malware@#1dj12238fl2ws
BitDefenderTheta Gen:NN.ZexaF.34608.lq0@ae3qfCij
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom_SPORA.F117DR
McAfee-GW-Edition BehavesLike.Win32.Dropper.ch
FireEye Generic.mg.696edc38320cdd5c
Emsisoft Gen:Variant.Ransom.Locky.143 (B)
SentinelOne Static AI – Suspicious PE
Avira TR/AD.Spora.bdftb
eGambit Unsafe.AI_Score_76%
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Ransom:Win32/Spora.A
Arcabit Trojan.Ransom.Locky.143
AegisLab Trojan.Win32.Spora.j!c
GData Gen:Variant.Ransom.Locky.143
McAfee GenericRXBH-NI!696EDC38320C
MAX malware (ai score=84)
VBA32 Backdoor.Poison
Malwarebytes Ransom.Spora
Panda Trj/CI.A
TrendMicro-HouseCall Ransom_SPORA.F117DR
Rising Backdoor.Poison!8.2D7 (CLOUD)
Ikarus Trojan.Win32.Injector
MaxSecure Trojan.Malware.7164915.susgen
Fortinet W32/Injector.DNYE!tr
AVG Win32:Rootkit-gen [Rtk]
Paloalto generic.ml
Qihoo-360 Win32/Ransom.Spora.HgIASOMA

How to remove Ransom.Locky.143?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 days ago