RandomLocker Ransomware Overview
Randomlocker is a part of the ransomware family. This ransomware arrives via Email / Phishing Campaign.
This is a new ransomware and it’s recently captured by the security researcher. This ransomware mainly targets the Desktop and encrypts the file contents that matches with its extension filter criteria.
This ransomware appends the filename by adding .rand extension in the last.
Flow Chart
Spread via Spam Emails or Phishing Campaigns
↓
Manually installing the ransomware.
↓
Generate the unlock key and show the files path that’s going to be encrypted
↓
Once you Click on the Start button, it starts the execution process automatically.
Technical Analysis of RandomLocker Ransomware
File Name: ransomware.exe
MD5: E74337A316AB212978AB38838D184F5D
File Type: Executable
Spread Via: Emails or Phishing Campaign.
Build In: .Net Application
Detailed Analysis with Screenshot:
On execution of this Ransomware, it displays the following window that generates the unlock key along with the file paths that are going to be encrypted if the user clicks on the Start button.

Figure 1 RandomLocker Startup Window
As shown above this ransomware sends the Unlock Key to their server and stored it into Pass.txt file.
This ransomware requires the internet connection for successful execution otherwise it will throw the exception message (“The remote server returned an error. (502) Bad Gateway”)

Figure 2 Network Error
On clicking the start button it initiates the encryption process on preloaded file paths.
This ransomware mainly targets the “Desktop Folder” on the system.
This ransomware doesn’t encrypt or delete the “volume shadow copies” or restore point from the system. As shown below, victim can easily recover the files by using restore points functionality.

Figure 3 Restore points
This ransomware encrypts only those files that matches its extensions criteria and appends the filename with “.rand” extension:
.scr .reg .pif .msi .lnk .cpl .com .cmd .bat .bas .docx .pptx .xlsx .xbap .xps .pdf .pot .hta .xlt .pps .xlw .dot .rtf .ppt .xls .doc .xml .htm .html .exe .mht .zip .dvr-ms .wvx .wmx .wmv .mpv2 .mpg .mpeg .mpe .mpa .mp2v .mp2 .m1v .IVF .asx .asf .wax .snd .rmi .m3u .aiff .aifc .aif .midi .mid .wma .wav .mp3 .wmf .tiff .tif .rle .png .jpeg .jpe .jpg .jfif .ico .gif .emf .dib .bmp .avi
Once the encryption has completed, it automatically downloads the image file and drops it into the “Pictures Folder” and on the “Desktop” of the system then change the Desktop wallpaper with the downloaded image that contains the message along with “RandomLocker” Count Down Timer Screen.

Figure 4 Downloaded Image
As shown below, this ransomware has started the countdown timer for 2 Hours. If the victim didn’t pay any amount in that duration, all the files will be deleted automatically.

Figure 5 CountDown Timer
During this analysis, we tried to decrypt the files by using the “Unlock Key” which was generated by the ransomware in the starting.
By using the “Unlock Key”, this ransomware only decrypts the 5 files.

Figure 6 Decrypted Files
In case, if the person tries to enter the wrong key more than 3 times, in that case all the encrypted files will be deleted immediately from the system and the timing of the CountDown Timer becomes 00:00:00

Figure 7 Files Deleted
As shown above, “Ransomware Author” has demanded for 10$ in bitcoins at following bitcoin address: “3GPg3tgwZakR5uTELzjMJRj1NarxHH9YdJ” and also warns the victim. If the user didn’t pay on time within 24 hours after encryption, the server will destroy the key.
Once the payment has been done victim have to send the mail on the following Email ID: randomlocker@tuta.io

Figure 8 Ransomware Author Email_ID
Network Information:
During analysis of this ransomware, we found that this ransomware attempts to connect with their C&C panel (Command & Control) Server to starts its encryption process.
Ransomware author creates the Victim ID on the server by using “victim computer’s name” and under that store’s the password (pass.txt) file.

Figure 9 Network Information
As shown above, this ransomware downloads the image from wallpaper-gallery[.]net.
During analysis we also found the web panel of the C&C Server (Command & Control)

Figure 10 Admin Panel
IOC’s
File Hash: E74337A316AB212978AB38838D184F5D
Network Connections:
Spread via Spam Emails or Phishing Campaigns