Ransomware Profile – “.flkr” Variant
(a.k.a. “Floker”, occasionally mis-detected as “WannaFlkr”)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Every encrypted file is given the .flkr suffix appended to the original extension – e.g.
2024-budget.xlsx.flkr
,server-dump.sql.flkr
. -
Renaming Convention: The ransomware retains the original file name and intermediate extension, simply appending
.flkr
to the end (no e-mail address, random bytes, or additional ID string).
2. Detection & Outbreak Timeline
- First Public Submission: 2023-08-14 (ID-Ransomware / MalwareHunterTeam).
- Growth Curve: Low-volume, targeted waves during Q3-2023; larger opportunistic spike observed December-2023 after affiliate builder leaked on Russian-language forum.
- Geographic Footprint: Heaviest infection counts reported in Latin-America, Southern-Europe and South-East Asia; English and Spanish ransom notes suggest bilingual affiliates.
3. Primary Attack Vectors
- Phishing with ISO / IMG lures – messages themed “DHL shipping delay”, “Incoming invoice” contain a 1-2 MB disk image that contains a .BAT and the .NET payload wrapped with a shortcut (.lnk).
- Exploitation of public-facing JBoss / Jenkins deserialization bugs (CVE-2017-12149, CVE-2019-1003000) – a Groovy or Java payload downloads and executes the Floker dropper.
-
RDP brute-force → manual deployment – attackers frequently install
flkr.exe
(often renamed tosvchost.exe
orSystemSoundServices.exe
) toC:\PerfLogs\
and execute with-net spread
switch to push to other hosts via ADMIN$ and scheduled tasks. -
Living-off-the-land – uses
vssadmin delete shadows /all
andbcdedit /set {default} recoveryenabled No
via embedded batch to cripple Windows restore points and SafeBoot.
Note: No EternalBlue / SMBv1 worming component has been observed; lateral movement relies on harvested credentials and legitimate Windows tools.
Remediation & Recovery Strategies
1. Prevention
- Patch externally reachable services (Jenkins, JBoss, Confluence, Citrix, etc.).
- Disable RDP from the Internet or wrap it in a VPN + enforced 2-FA.
- Enforce local-only accounts for RDP; block admin users from interactive logon if possible.
- E-mail filtering rules: strip ISO, IMG, VHD, OneNote and script files at gateway.
- Application whitelisting / WDAC to block unsigned binaries in
%TEMP%
,%PUBLIC%
,PerfLogs
. - Maintain offline (air-gapped) backups; test restores regularly. Floker deletes Volume Shadow Copies but does not wipe or overwrite backup appliances it cannot address by UNC path.
2. Infection Cleanup (step-by-step)
- Physically isolate the host (pull cable / disable Wi-Fi) – Floker’s network-spread thread is active until reboot.
-
Boot into Safe Mode with Networking or use a Windows-RE disk; terminate
svchost.exe
or the masqueradedSystemSoundServices.exe
twice (two processes watch each another). - Delete persistence artefacts:
- Scheduled task “\Microsoft\Windows\DiskFootPrint\DiskCleanup”
- Registry RUN key
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\DiskOptimizer = "C:\PerfLogs\svchost.exe"
-
Remove the hidden folder
%ProgramData%\FlokerC2\
that contains the affiliate-ID, TA public key and list of whitelisted folders/extensions (useful for forensics). - Run a reputable AV/EDR scan (signature names: Ransom:Win32/Floker.A, Trojan.Win32.DelShad.flkr) to remove the binaries.
-
Restore normal boot (
bcdedit /set {default} recoveryenabled Yes
) so you can enter WinRE again if necessary.
3. File Decryption & Recovery
-
Decryptable? At the time of writing there is NO free decryptor.
Floker uses: - Curve25519 for key exchange,
- AES-256-CTR for bulk file encryption,
- Each victim gets a unique offline public key embedded in the binary – so no master key exists.
- Recovery Options:
- Restore from offline backups (Cloud snapshots, LTO, USB drives disconnected during incident).
- Use ShadowExplorer or
vssadmin list shadows
AFTER removal – occasionally the malware fails to erase shadows on non-system drives. - File repair/undelete tools (PhotoRec, R-Studio) to retrieve pre-encryption copies only if the disk was HDD, nearly full and NTFS re-used clusters quickly.
-
Contact law-enforcement; the FBI and Spain’s CERT both hold seized “Floker C2” servers seized in Jan-2024 – victims who can provide the
affiliate-id
(bottom of ransom note) might eventually be invited to a future key-release programme.
- Tools / Patches relevant to Floker:
- Jenkins 2.442 LTS / 2.426.2 fixes CVE-2019-1003000 (released 2024-01-17).
- JBoss AS 7.2.1 patch or migration to WildFly 27+ eliminates deserialization flaw.
- Microsoft Defender engine 1.403.236.0+ and Sophos 5.3.2 both provide behaviour-based protection.
4. Other Critical Information
-
Sabotages 3rd-party backups: The binary specifically calls vendor processes (
veeam.Service.exe
,synology.service
,cb.exe
) to terminate them prior to encryption; it does NOT however delete the repository files. Turn these services back on only after forensics capture. -
Ransom note (
UTORRENT-CHANGES.TXT
/HOW_TO_BACK_FILES.TXT
) contains: “Don’t trust shady middle-men who offer public discounts – we are the only ones with your private key.” Research shows affiliates are, in fact, negotiating 25–45 % discounts when victims wait >10 days. - No wiper function observed – iff the process finishes normally the machine remains stable, which aids data-recovery efforts from free-space carving.
- Wider Impact: Because Floker is not wormable and spread by affiliates, incident sizes are smaller than LockBit-style blasts; however its preference for older but still widely deployed Java stacks (Jenkins / JBoss) makes it a major hazard for DevOps and OT networks that cannot patch quickly.
Bottom line: Back-up offline, keep Java app-servers updated, block RDP & phishing lures, and assume decryption without payment is currently impossible. If you are already hit, save a copy of the malware binary + ransom note—those artefacts are the only hope should law-enforcement later release seized keys. Stay safe.