ZeroLocker is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on August 1, 2014, this ransomware has been actively targeting systems worldwide.
Quick Facts
Ransomware Family
ZeroLocker
First Seen
August 1, 2014
How ZeroLocker Ransomware Works
File Encryption Patterns
ZeroLocker modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..encrypt
Ransom Note and Payment Demands
After encrypting files, ZeroLocker displays ransom notes demanding payment for file recovery:
message
Ransom message:
notes/note.txt
Note locations:
Login
Technical Indicators
Associated Executable Files
The following executable files are associated with ZeroLocker ransomware:
Task Manager.exe
zero.exe
Zerolocker.exe
zerolocker.exe
Trojan.Ransom.ZeroLocker.exe
zerolocker
588.json
binary
myfile.exe
zer.exe
juhu.exe
d8b81df4-24ed-468e-b076-1d4db6f6ce1f.d2
file-7309804_exe
5.exe
WinUpd32.exe
Elastio Can Help You
Don't let ZeroLocker ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
This ZeroLocker ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like ZeroLocker.