- Home
- Detectable Ransomware
- Balaclava
Ransomware Research
Balaclava Ransomware
Balaclava is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on February 1, 2020, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: DavesSmith, JerryGlanville, KEY0004, Michael, Coryell, PuckettJeffrey.
Quick Facts
- Ransomware Family
- Balaclava
- First Seen
- February 1, 2020
- Known Aliases
- DavesSmithJerryGlanvilleKEY0004MichaelCoryellPuckettJeffrey
How Balaclava Ransomware Works
Targeted Files
Encrypts first 2Mb
File Encryption Patterns
Balaclava modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..jerry_glanville_data@aol.com
..KEY0004
..michael
..coryell
..puckett_jeffrey
..daves.smith@aol.com
Ransom Note and Payment Demands
After encrypting files, Balaclava displays ransom notes demanding payment for file recovery:
RECOVERY FILE.txt
Ransom message:
notes/RECOVERY FILE.txt
HOW_TO_RECOVERY_FILES.txt
Ransom message:
notes/HOW_TO_RECOVERY_FILES.txt
Note locations:
EveryFolder
Technical Indicators
Associated Executable Files
The following executable files are associated with Balaclava ransomware:
OUT_CLEANED+TSTDEL.EXE
Lock.exe1
C620F33063425F3.exe
puckett_jeffrey.exe
Lock.exe
Elastio Can Help You
Don't let Balaclava ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This Balaclava ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Balaclava.
Last updated: July 30, 2025