Ransomware Research
LockeR Ransomware
LockeR is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on October 1, 2017, this ransomware has been actively targeting systems worldwide.
Quick Facts
- Ransomware Family
- LockeR
- First Seen
- October 1, 2017
How LockeR Ransomware Works
Targeted Files
Encrypts filenames -> QAAZXOYHMOIRVIOCHEOMKEVYBAE.locked
File Encryption Patterns
LockeR modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..locked
Ransom Note and Payment Demands
After encrypting files, LockeR displays ransom notes demanding payment for file recovery:
[How_To_Decrypt_Files].txt
Ransom message:
notes/[How_To_Decrypt_Files].txt
[HOW_TO_DECRYPT_FILES].html
Ransom message:
notes/[HOW_TO_DECRYPT_FILES].html
Note locations:
EveryFolder
Elastio Can Help You
Don't let LockeR ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This LockeR ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like LockeR.
Last updated: July 30, 2025