Locky experiments with Windows Script Host delivery

Kevin Beaumont
Feb 19, 2016 · 2 min read

In the last 30 minutes we’ve been targeted by Locky with emails in native language for the domain recipient. They successfully bypass most antivirus again, and work against Microsoft Outlook environments.

The emails look like this, i.e. a real business email:

Image for post
Image for post

The ZIP file contains a JavaScript file. Microsoft Outlook allows this to bypass safe file filtering by default, and helpfully unzips for you:

Image for post
Image for post

The Javascript file has 0% antivirus detection:

Image for post
Image for post

The JavaScript file does this:

Image for post
Image for post

The payload is Locky, with approximately 5% detection of the payload right now. See my prior posts on Locky.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch

Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore

Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store