CryptoLocker by NTK is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on February 1, 2017, this ransomware has been actively targeting systems worldwide.
Quick Facts
Ransomware Family
CryptoLocker by NTK
First Seen
February 1, 2017
How CryptoLocker by NTK Ransomware Works
Targeted Files
Current sample encrypts C:\Utilisateurs\Administrateur\Documents folder only
File Encryption Patterns
CryptoLocker by NTK modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..powned
Ransom Note and Payment Demands
After encrypting files, CryptoLocker by NTK displays ransom notes demanding payment for file recovery:
message
Ransom message:
notes/note.txt
Note locations:
OnceOnCompletion
Technical Indicators
Associated Executable Files
The following executable files are associated with CryptoLocker by NTK ransomware:
CryptoLocker by NTK.exe
Elastio Can Help You
Don't let CryptoLocker by NTK ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
This CryptoLocker by NTK ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like CryptoLocker by NTK.