Locky-Diablo6 is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on August 1, 2017, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Diablo6.
Quick Facts
Ransomware Family
Locky-Diablo6
First Seen
August 1, 2017
Known Aliases
Diablo6
How Locky-Diablo6 Ransomware Works
Targeted Files
https://www.hybrid-analysis.com/sample/390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891?environmentId=100
f689391b0527fbf40d425e1ffb1fafd5c84fa68af790e8cc4093bcc81708c11b -> OK
Full filenames -> DF383IWD-3771-DRCX-29456BE9-9F7828E960C4.diablo6
File Encryption Patterns
Locky-Diablo6 modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..diablo6
Ransom Note and Payment Demands
After encrypting files, Locky-Diablo6 displays ransom notes demanding payment for file recovery:
file/^diablo6-\w{4}\.htm$/
Ransom message:
notes/diablo6-6a58.htm
Note locations:
EveryFolder
Technical Indicators
Associated Executable Files
The following executable files are associated with Locky-Diablo6 ransomware:
file.exe
y872ff2f
ivUaNDRd.exe
http___dbr663dnbssfrodison.net_af_y872ff2f
y872ff2f.exe
Elastio Can Help You
Don't let Locky-Diablo6 ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
This Locky-Diablo6 ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Locky-Diablo6.