Ransom

What is “Ransom.Locky.25”?

Malware Removal

The Ransom.Locky.25 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Locky.25 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Behavior consistent with a dropper attempting to download the next stage.
  • Exhibits behavior characteristic of Locky ransomware
  • Anomalous binary characteristics

Related domains:

mnjwgkeoavmtkn.xyz
ngypcog.su
ovoimthguope.su
xgivkljqglfom.org
vyxwwynqs.pw
bsdjjjxtjysuwa.click
swqvjsjxmeevkci.info
rxdebemdlaux.org
sjjwndtji.ru
jhyfmmcsr.work
opqanlhkwvnvhwmit.pl

How to determine Ransom.Locky.25?


File Info:

crc32: BC89486E
md5: b0711700d621dbab87c58f0514b590fe
name: B0711700D621DBAB87C58F0514B590FE.mlw
sha1: 671ff58e8465bd6673cd072afca8be0e14cd4053
sha256: eee35e9306a3723508af850ef56dfa1b5c0b0916cd8e76deb1dc3e6016c7cd3b
sha512: fe11b6722852686e56b55b5b4eddf5f2cedd175b8bf8a6e4f4d7ffe55c7437f4051f30083dce54230ceba293c54d535c3bcce9a7995b8369d995f3c14eed0dd6
ssdeep: 3072:fKWiT6UGUxIfmKEw4DYzDgnLGIfUubVzMhSiySs1Uaj4R+Os3Fa:fxi+hUOmKWcPg62UgzMha1UBR+B3F
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

filedescription: Dactylic
fileversion: 60.71.56.894
companyname: Orpiments
Translation: 0x0389 0x0300

Ransom.Locky.25 also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 004fa9731 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.3976
CynetMalicious (score: 100)
CAT-QuickHealRansom.Locky.D6
ALYacGen:Variant.Ransom.Locky.25
CylanceUnsafe
ZillyaTrojan.Generic.Win32.62257
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 004fa9731 )
Cybereasonmalicious.0d621d
BaiduWin32.Trojan.Kryptik.awk
CyrenW32/Locky.BD.gen!Eldorado
SymantecTrojan Horse
ESET-NOD32a variant of Win32/Kryptik.FHTG
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Ransom.Locky.25
NANO-AntivirusTrojan.Win32.Kryptik.evptbb
MicroWorld-eScanGen:Variant.Ransom.Locky.25
TencentWin32.Trojan.Generic.Pdbt
Ad-AwareGen:Variant.Ransom.Locky.25
SophosMal/Generic-S
ComodoMalware@#3dym0enxeclyo
BitDefenderThetaGen:NN.ZexaF.34686.muW@aOi0w1pi
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPLOCKY.SMBOS3
McAfee-GW-EditionBehavesLike.Win32.PWSZbot.cc
FireEyeGeneric.mg.b0711700d621dbab
EmsisoftGen:Variant.Ransom.Locky.25 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.btfif
AviraHEUR/AGEN.1121498
eGambitUnsafe.AI_Score_97%
MicrosoftTrojan:Win32/Tiggre!rfn
AegisLabTrojan.Win32.Generic.4!c
GDataGen:Variant.Ransom.Locky.25
AhnLab-V3Trojan/Win32.Generic.C2378669
Acronissuspicious
McAfeeArtemis!B0711700D621
MAXmalware (ai score=100)
VBA32Trojan.Encoder
MalwarebytesRansom.Locky.Generic
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_HPLOCKY.SMBOS3
RisingTrojan.Ransom-Locky!8.4655 (CLOUD)
YandexTrojan.Agent!BHm7ByDuqWQ
IkarusTrojan.Win32.Crypt
FortinetW32/Kryptik.FIEQ!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Ransom.Locky.25?

Ransom.Locky.25 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment