- Home
- Detectable Ransomware
- Yoshikada
Ransomware Research
Yoshikada Ransomware
Yoshikada is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on January 1, 2018, this ransomware has been actively targeting systems worldwide.
Quick Facts
- Ransomware Family
- Yoshikada
- First Seen
- January 1, 2018
How Yoshikada Ransomware Works
Targeted Files
Nosample 46e15d873da97aa49966cc1f8e80f7ed125e8516a51647f0e6333774c8709da8 -> decryptor
File Encryption Patterns
Yoshikada modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..crypted_yoshikada@cock_lu
Ransom Note and Payment Demands
After encrypting files, Yoshikada displays ransom notes demanding payment for file recovery:
how_to_back_files.html
Ransom message:
notes/how_to_back_files.html.txt
Technical Indicators
Associated Executable Files
The following executable files are associated with Yoshikada ransomware:
decryptor.exe
Elastio Can Help You
Don't let Yoshikada ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This Yoshikada ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Yoshikada.
Last updated: July 30, 2025