Any files that are encrypted with Loki Locker (Blackbit) Ransomware will have an [<email>][ID random 8 characters]<filename>.[extension] followed by the .Loki, .BlackBit, .Rainman, .PayForKey, .Adair, .Boresh, .onion700, .DATA extension appended to the end of the encrypted data filename as explained here by Amigo-A (Andrew Ivanov). These are some examples.
.[lolooki@protnmail.com][7E09E942]<filename>.mp4.Loki .[spystar@onionmail.org][9ECFA84E]<filename>.jpg.BlackBit .[bloc.boy@yandex.com][C279F237]<filename>.pdf.Rainman .[Onion749@onionmail.org][52294877]<filename>.log.onion700 .[crypter@firemail.de][43DE62EH]<filename>.jpg.kill
Loki Locker typically will leave files (ransom notes) named Restore-My-Files.txt, info.hta, #FILES-ENCRYPTED.txt.
Some variants of Loki Locker are known to include a random 8 character System ID with a note about deleting specific files causing permanent data loss.
Your SYSTEM ID : 82F54321 !!!Deleting "Cpriv.Loki" causes permanent data loss. Your SYSTEM ID : 8E4A83CF !!!Deleting "Cpriv.BlackBit" causes permanent data loss. Your System ID : 689DBE54 !!!Deleting "xor.689DBE54.kill" causes permanent data loss.
is there any solution for LOKI LOCKER ransomware?
Edited by quietman7, 21 November 2023 - 07:53 PM.
Moved from Intros to Ransomware - Hamluis.