Ransomware Research

Lockify Ransomware

Lockify is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on May 1, 2017, this ransomware has been actively targeting systems worldwide.

Quick Facts

Ransomware Family
Lockify
First Seen
May 1, 2017

How Lockify Ransomware Works

Targeted Files

Requires C&C to send data VM checks Lockify.llog in the %APPDATA% folder Ransom note is downloaded from the C&C https://www.hybrid-analysis.com/sample/0852eb3481a7aa30d216f51e187794ecefa11efb72f68c5af5ac0814d2b3fb27?environmentId=100

File Encryption Patterns

Lockify modifies encrypted files using specific patterns to mark them as encrypted:

File extensions added after encryption:

..Lockify

Ransom Note and Payment Demands

After encrypting files, Lockify displays ransom notes demanding payment for file recovery:

fileReadme.HTA

Ransom message:

notes/Readme.HTA

Note locations:

Desktop

Technical Indicators

Associated Executable Files

The following executable files are associated with Lockify ransomware:

  • ConsoleApplication1.exe
  • 6.exe
  • ca.exe

Elastio Can Help You

Don't let Lockify ransomware take over your data

Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.

About This Analysis

This Lockify ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Lockify.

Last updated: July 30, 2025