PureLocker is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on September 1, 2019, this ransomware has been actively targeting systems worldwide.
Quick Facts
Ransomware Family
PureLocker
First Seen
September 1, 2019
How PureLocker Ransomware Works
Targeted Files
https://www.intezer.com/blog/malware-analysis/purelocker-ransomware-being-used-in-targeted-attacks-against-servers/ Current samples are DLL's with a lot of anti-analysis tricks and checks
File Encryption Patterns
PureLocker modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..CR1
Ransom Note and Payment Demands
After encrypting files, PureLocker displays ransom notes demanding payment for file recovery:
fileYOUR_FILES.txt
Ransom message:
notes/YOUR_FILES.txt
Technical Indicators
Associated Executable Files
The following executable files are associated with PureLocker ransomware:
cryptopp
cryptopp.dll
cryptopp_w2.dll
Elastio Can Help You
Don't let PureLocker ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
This PureLocker ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like PureLocker.