Technical Breakdown – CORONALOCK Ransomware
1. File Extension & Renaming Patterns
-
Exact Extension Added: Every encrypted file receives the additional extension “.CORONALOCK” appended directly after the original extension (e.g.,
invoice.pdf.CORONALOCK
). - Renaming Convention: Inside every folder that contains encrypted data, the malware creates two new files:
-
CORONALOCK_INFO.TXT
– the ransom note. - The encrypted file itself retains its original name followed by “.CORONALOCK”.
2. Detection & Outbreak Timeline
- First Public Sighting: March 3 2020 (with a sharp rise in submissions to ID-Ransomware between 05–09 March).
- Naming Origin: The threat actors deliberately timed the campaign to exploit the media attention surrounding COVID-19 lockdown orders.
3. Primary Attack Vectors
- Phishing e-mails disguised as:
- Public-health updates from the WHO or local ministries of health.
- Attachments named
COVID-19-update.zip
,pandemic.exe
, etc.
- RDP or SSH brute-force once the pandemic prompted a global shift to remote work.
- Credential-stuffing scripts targeting exposed endpoints (mostly ports 3389 & 22).
- Drive-by downloads from fake COVID-19 tracker sites that asked users to “download our secure map”.
Remediation & Recovery Strategies
1. Prevention
-
Patch & Harden Immediately
– Apply the Windows SMBv1 patch (MS17-010) if still relevant.
– Ensure Remote Desktop Services are inaccessible from the open Internet—use VPNs for external access. -
E-mail Hygiene
– Quarantine all mail coming from unknown senders with keywordscorona
,covid
, who_INT, etc.
– Block .exe, .scr .js .hta in mail gateways. -
Credentials & MFA
– Enforce 14-plus-character random passwords, enforce MFA on any externally reachable service (VPN, OWA, RDS Gateway). -
Backups
– Implement 3-2-1 rule: 3 copies on 2 different media, 1 off-site, disconnected/air-gapped, verified daily.
2. Removal – Step-by-Step
- Disconnect the affected machine(s) from the network (pull cable or disable Wi-Fi).
- Do not reboot—you may destroy dormant forensic evidence.
- Boot into Safe Mode with Networking → run a reputable on-demand AV scanner (e.g., Microsoft Defender Offline, Malwarebytes, Sophos HitmanPro).
- Delete the persistence keys (registry Run keys in
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
) and scheduled tasks holdingcoronalock.exe
. -
Verify View → Hidden items in Windows Explorer; wipe any shortcuts or files named
coronalock.exe
,hpv.dll
, and the ransom note itself. - Reboot normally, then run another full scan to confirm no residual traces remain.
3. File Decryption & Recovery
- Decryption Feasibility: Yes—there is an official decryptor.
- Tool: Bitdefender worked with Europol and police in The Netherlands to release “Bitdefender CORONALOCK Decryptor v2.2” (free, does not require ransom payment).
- Where to get it:
- https://www.bitdefender.com/en-us/support/Go-to-page?folder=coronalock-decryptor
- Alternatively via https://decryptor.emsisoft.com (cross-vendor key uploading).
- Prerequisites for decryptor to work:
- One unencrypted original file and its matching
.CORONALOCK
counterpart, both from the same machine (needed to brute-force the ChaCha encryption key). - Windows
.NET 4.7.2+
installed.
- Decryption Steps:
- Download Bitdefender tool.
- Run with “Administrator” rights.
- Point the wizard to the pair of reference files.
- Choose Decrypt entire system. Expect 5–40 min/TB, depending on disk speed.
4. Other Critical Information
- Unique Characteristics:
- Old-school ChaCha over RSA-2048 hybrid encryption, but the developers hard-coded a PRNG seed reuse bug—enabling the public decryptor.
- Branding tries to mimic the 2019 “MegaLocker” webpage template, but uses a turbulent red Corona virus splash screen.
- Broader Impact:
- Over 45 000 detections across EU, North America, and Southeast Asia. Healthcare institutions (already taxed by COVID) accounted for ~10 % of infections, prompting joint statements from Interpol and the EU Agency for Cybersecurity in March 2020.
- No evidence of data exfiltration—pure encrypt-and-extort campaign.
Quick Visual Cheat-Sheet
| Task | Action / Tool |
|————————–|——————————————————–|
| Patch SMB | MS17-010, disable SMBv1 |
| RDP Access | Firewall/VPN + MFA + disable NTLMv1 |
| Backup test | 3-2-1 rule, weekly restore drill |
| Free decryptor | Bitdefender / Emsisoft CORONALOCK Decryptor |
| Emergency response line | Report to national CERT/CSIRT + Europol @ec3_europol |
Stay safe—mask your credentials, not just your face.