FilesLocker Ransomware – Community Defense Guide
File-extension hall-mark: .locked
(variant A) and .[[email]].fileslocker
(variant B)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Extension:
.locked
(first wave, Aug-2018) or.[[attacker_email]].fileslocker
(second wave, Oct-2018 →) -
Renaming convention:
original_name.docx
→original_name.docx.locked
OR
Budget.xls
→Budget.xls.[[email protected]].fileslocker
The address inside the bracket is usually a ProtonMail / Cock.li / Tutanota mailbox used for victim communication.
2. Detection & Outbreak Timeline
- First public submissions: 12-Aug-2018 (MalwareHub, ID-Ransomware)
- Major spreading spike: September 2018 (China & U.S. simultaneous campaigns)
- Active through: Q4-2018 / Q1-2019; copy-cat spin-offs seen in 2020 but original C2s sink-holed.
3. Primary Attack Vectors
-
Phishing with .jar, .js or .exe inside double-extension “PDF invoice” attachments
(e.g., “Invoice_2308.pdf.js”) - RDP brute-forcing – scans TCP/3389, keeps a small Chinese-language credential list (root:admin, admin:123456, …)
- EternalBlue (MS17-010) – worm module used in Oct-2018 wave for LAN propagation only (not Internet-facing).
- Exploitation of un-patched WebLogic, Drupal & Tongda OA flaws in China-centric intranets.
- No software supply-chain compromise observed; strictly opportunistic.
Remediation & Recovery Strategies
1. Prevention
✅ Disable RDP or move to RDP-gateway + 2FA; restrict TCP/3389 at perimeter.
✅ Patch: MS17-010, Oracle WebLogic CVE-2017-10271, CVE-2018-2628, Drupalgeddon2.
✅ Remove Office-macro & script (js, vbs, wsf) execution via GPO.
✅ Use application whitelisting (Windows Defender Application Control / AppLocker).
✅ Segment LAN; block SMBv1 across VLANs (FilesLocker uses NetBIOS enumeration).
✅ Backup 3-2-1 rule: three copies, two media, one offline (FilesLocker deletes Volume Shadow Copies).
✅ Mail-filtering rules: quarantine double-extension attachments and JAR inside ZIP.
2. Removal (clean-up sequence)
- Physically isolate the box (unplug Ethernet / Wi-Fi).
- Collect a memory image for forensics if needed (FilesLocker keeps an AES-256 key in heap until reboot).
- Boot into Safe Mode with Networking or mount the disk on a clean Win-PE/Ubuntu USB.
- Remove persistence:
- Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\
“FileLocker” - Scheduled task:
“FileLocker AutoRun”
referencing%AppData%\Roaming\FileLocker.exe
- Delete dropped binaries:
%AppData%\Roaming\FileLocker.exe
%ProgramData%\dllhost.exe
- Remove the self-delete batch usually sitting in
%TEMP%\delme.bat
. - Update & run a reputable AV (Windows Defender, Kaspersky, ESET, Bitdefender) – all have static signatures (
Ransom:Win32/FilesLocker.A!bit
). - Reboot normally → confirm no new
.locked
files appear when you create a test file.
3. File Decryption & Recovery
-
FilesLocker’s encryption:
– AES-256-CBC per file (random IV, key encrypts with 2048-bit attacker RSA public key).
– Private RSA key never left the C2; NO free universal decryptor exists. -
Possibilities to get data back:
1) Paying the threat actor (not recommended, supports crime).
2) Victims who grabbed RAM before reboot occasionally found the AES key withFilesLockerDump
(custom Volatility plugin from 360-CERT). Works only:
– Same Windows session (no reboot)
– Free memory still intact
– Virus process not self-killed
3) Checkid-ransomware.malwarehunterteam.com
; paste ransom note (# FILES LOCKER #.txt
). If you see “FilesLocker v2.0 – decryptable”, someone leaked that campaign’s RSA private key and the site will give you a link to a decryptor.
4) Restore from offline backup – the only reliable path for the majority.
Essential tools / patches
- Microsoft update catalog KB4457144 (EternalBlue)
- 360-CERT
FilesLockerDump.py
(Volatility) -
ShadowCopyView
(recover shadow copies if the attacker’svssadmin delete shadows
failed) - Emisoft & Kaspersky have generic decryptors that cover some leaked RSA keys; test a sample file.
4. Other Critical Information
Unique characteristics:
- Multi-language ransom notes: EN, CN, DE, RU dropped in same folder; chooses system language for desktop wallpaper.
-
Also targets non-Windows systems: a
*.sh
variant that encrypts Samba-shared folders from Linux servers (uses OpenSSL AES). - Hard-coded Chinese language resource strings indicate the developer’s origin; primarily marketed on Chinese underground “Dark-Gate” forum, but ransom messages demanding $300–$600 payable in BTC are English.
- Telegram notification channel: victims are instructed to join a t.me/fileslocker “support” bot; channel ID embedded in the malware → helps tracking campaigns.
Broader Impact
- ≈ 4 000 reported submissions to ID-Ransomware within four months; biggest hit municipalities in Guangdong and educational networks in California.
- Demonstrated that low-skill actors can purchase kit (less than $100) and weaponise it with EternalBlue in under 24 h – accelerated shift to “Ransomware-as-a-Cheap-Service”.
Share this sheet, keep patches current, and test those offline backups – FilesLocker is old but still recycled in copy-cat attacks. Stay safe!