Ransomware Research
Vaca Ransomware
Vaca is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on January 1, 2019, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Xorist-Vaca.
Quick Facts
- Ransomware Family
- Vaca
- First Seen
- January 1, 2019
- Known Aliases
- Xorist-Vaca
How Vaca Ransomware Works
Targeted Files
Encrypts 1Mb Skips first 20 bytes https://app.any.run/tasks/e87830ea-3526-44a1-9dfc-0d9a8cd18592/
File Encryption Patterns
Vaca modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..vaca
..locked3dllkierff
Ransom Note and Payment Demands
After encrypting files, Vaca displays ransom notes demanding payment for file recovery:
HOW TO DECRYPT FILES.txt
Ransom message:
notes/HOW TO DECRYPT FILES.txt
Note locations:
EveryFolder
HOW TO DECRYPT FILES.txt
Ransom message:
notes/HOW TO DECRYPT FILES.txt
Note locations:
EveryFolder
Technical Indicators
Associated Executable Files
The following executable files are associated with Vaca ransomware:
ara.exe
4.exe
Elastio Can Help You
Don't let Vaca ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This Vaca ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Vaca.
Last updated: July 30, 2025