Ransomware Research

Yoshikada Ransomware

Yoshikada is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on January 1, 2018, this ransomware has been actively targeting systems worldwide.

Quick Facts

Ransomware Family
Yoshikada
First Seen
January 1, 2018

How Yoshikada Ransomware Works

Targeted Files

Nosample 46e15d873da97aa49966cc1f8e80f7ed125e8516a51647f0e6333774c8709da8 -> decryptor

File Encryption Patterns

Yoshikada modifies encrypted files using specific patterns to mark them as encrypted:

File extensions added after encryption:

..crypted_yoshikada@cock_lu

Ransom Note and Payment Demands

After encrypting files, Yoshikada displays ransom notes demanding payment for file recovery:

filehow_to_back_files.html

Ransom message:

notes/how_to_back_files.html.txt

Technical Indicators

Associated Executable Files

The following executable files are associated with Yoshikada ransomware:

  • decryptor.exe

Elastio Can Help You

Don't let Yoshikada ransomware take over your data

Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.

About This Analysis

This Yoshikada ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Yoshikada.

Last updated: July 30, 2025