{"id":50266,"date":"2016-06-06T11:27:53","date_gmt":"2016-06-06T18:27:53","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=50266"},"modified":"2025-06-02T18:56:43","modified_gmt":"2025-06-03T01:56:43","slug":"locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/","title":{"rendered":"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript"},"content":{"rendered":"<p><em>This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni.<\/em><\/p>\n<p>During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Locky, a new ransomware threat spread via spam campaigns. The contents of the spam email are carefully crafted to lure victims using social engineering techniques. McAfee Labs\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/locky-ransomware-rampage-javascript-downloader\/\">blogged about Locky\u00a0<\/a>in March. You can read more about Locky in\u00a0McAfee Labs Threat Advisory. We have recently observed new campaigns of Locky and have described them below.<\/p>\n<h2><strong>XOR obfuscation<\/strong><\/h2>\n<p>Locky arrives through a spam email attachment that evades antispam filters and attempts to trick users via social engineering into opening the attachment. In general practice, these Locky payloads have not been obfuscated in these campaigns. On May 24\u00a0we first observed a payload obfuscated with\u00a0XOR. XOR (exclusive OR) obfuscation is a logical operation that\u00a0outputs &#8220;true&#8221; only when inputs differ. This technique is simple, fast, and generally effective to evade the detection. In this case the malware was\u00a0XORed with 0xFF.<\/p>\n<p>The XORed payload (hash: 7FD3E08F67C6B8CC4031D056F71B9762) looks like the following snippet:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50267\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg\" alt=\"1\" width=\"719\" height=\"602\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2.jpg 719w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2-300x251.jpg 300w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/p>\n<p>After XORing with 0xFF, the sample appears in its original format, the Locky executable:<\/p>\n<p style=\"text-align: justify; line-height: 14.65pt; background: white;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50268\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2-1.jpg\" alt=\"2\" width=\"707\" height=\"604\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-1.jpg 707w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-1-300x256.jpg 300w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>XOR and reverse obfuscation<\/strong><\/h2>\n<p>After a couple of days, we observed another enhanced technique used for obfuscation: XORed and reversed. At first, the malware sample (C60DE80123131AC980F4E49DAD20A89D) looks like a junk file. In fact it was\u00a0XORed with 0x73 and reversed. The encrypted malware sample:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50269\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/3-1.jpg\" alt=\"3\" width=\"699\" height=\"581\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-1.jpg 699w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-1-300x249.jpg 300w\" sizes=\"auto, (max-width: 699px) 100vw, 699px\" \/><\/p>\n<p>This version of the payload comes with an additional last four bytes as a checksum. After XORing with 0x73 the sample appears like this:<\/p>\n<p style=\"text-align: justify; line-height: 14.65pt; background: white;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50270\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/4-1.jpg\" alt=\"4\" width=\"702\" height=\"573\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-1.jpg 702w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-1-300x245.jpg 300w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" \/><\/p>\n<p>After removing the checksum and reversing the bytes, it is again a Locky executable.<\/p>\n<h2><strong>JavaScript obfuscation<\/strong><\/h2>\n<p>As expected, the attackers have now come up with a new twist, encoding the downloaded file. This step is a\u00a0new and different deployment behavior to avoid detection. In the last couple of days, we have received several samples of this kind.<\/p>\n<p>The zip attachment\u00a0in the spam email contains a\u00a0JavaScript\u00a0file (generally <a href=\"https:\/\/kc.mcafee.com\/resources\/sites\/MCAFEE\/content\/live\/PRODUCT_DOCUMENTATION\/26000\/PD26309\/en_US\/McAfee_Labs_Threat_Advisory_JS-Nemucod.pdf\"><u>Nemucod<\/u>).<\/a>\u00a0The infection process follows this path:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50271\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/5-1.jpg\" alt=\"5\" width=\"1234\" height=\"94\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-1.jpg 1234w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-1-300x23.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-1-768x59.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-1-1024x78.jpg 1024w\" sizes=\"auto, (max-width: 1234px) 100vw, 1234px\" \/><\/p>\n<p>At first, the file looks like highly obfuscated JavaScript and is tough to understand. The last few lines of the script <span class=\"apple-converted-space\"><span style=\"background: white;\">(hash: 7FD3E08F67C6B8CC4031D056F71B9762) <\/span><\/span>looks like this:<\/p>\n<p style=\"background: white; vertical-align: baseline; margin: 12.0pt 0cm .0001pt 0cm;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50272\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/6-1.jpg\" alt=\"6\" width=\"669\" height=\"238\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-1.jpg 669w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-1-300x107.jpg 300w\" sizes=\"auto, (max-width: 669px) 100vw, 669px\" \/><\/p>\n<p>We tried to deobfuscate by modifying the original script a bit. After deobfuscating, we found another obfuscated JavaScript but this time more readable. Here is the modified script that dumps the first layer of deobfuscated script.<\/p>\n<p style=\"background: white; vertical-align: baseline; margin: 12.0pt 0cm .0001pt 0cm;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50273\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/7-1.jpg\" alt=\"7\" width=\"680\" height=\"326\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-1.jpg 680w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-1-300x144.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>After removing the first layer of obfuscation, parts of code become more visible. Now we can see the obfuscated URLs that\u00a0download the payloads once fully deobfuscated.<\/p>\n<p style=\"text-align: justify; background: white; vertical-align: baseline; margin: 12.0pt 0cm .0001pt 0cm;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50274\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/8-1.jpg\" alt=\"8\" width=\"724\" height=\"243\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-1.jpg 724w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-1-300x101.jpg 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/p>\n<p>After the second layer of deobfuscation, we finally obtain more visible code. Here we can see the URL of three compromised websites from which the script\u00a0tries to download the payload.<\/p>\n<p style=\"text-align: justify; background: white; vertical-align: baseline; margin: 12.0pt 0cm .0001pt 0cm;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50275\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/9-1.jpg\" alt=\"9\" width=\"603\" height=\"172\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-1.jpg 603w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-1-300x86.jpg 300w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/p>\n<p>The\u00a0script will try the second URL if the first download fails, and so on.\u00a0If successful, it downloads the encoded payload, which at first looks like a junk file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50276\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/10-1.jpg\" alt=\"10\" width=\"696\" height=\"462\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-1.jpg 696w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-1-300x199.jpg 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Let&#8217;s take a look at the steps to decode the junk file:<\/p>\n<p><em>Step 1:<\/em> Validate the downloaded file by calculating its checksum. The body of this function follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50277\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/11-1.jpg\" alt=\"11\" width=\"758\" height=\"244\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-1.jpg 758w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-1-300x97.jpg 300w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/p>\n<p><em>Step 2:<\/em>\u00a0Reverse the whole file using the reverse () method of JavaScript.<\/p>\n<p><em>Step 3:<\/em>\u00a0Run the decryption algorithm on the reversed file. After successful decryption, we see the payload is Locky. We have seen two variants so far, with the only change Key2. The pseudocode for the decryption mechanism follows:<\/p>\n<p><em>Variant 1:<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50278\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/12-2.jpg\" alt=\"12\" width=\"667\" height=\"177\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/12-2.jpg 667w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/12-2-300x80.jpg 300w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/p>\n<p><em>Variant 2:\u00a0<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50279\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/13-1.jpg\" alt=\"13\" width=\"672\" height=\"180\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/13-1.jpg 672w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/13-1-300x80.jpg 300w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p><em>Step 4:<\/em> After decoding, the file checks the size and a valid\u00a0MZ\u00a0signature. If the check fails, it repeats the process in search of a valid payload. The body of the check function looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50280\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/14-1.jpg\" alt=\"14\" width=\"590\" height=\"387\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/14-1.jpg 590w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/14-1-300x197.jpg 300w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/p>\n<p><em>Step 5:<\/em>\u00a0The script executes the payload after Step 4 is successful.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50281\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/15-1.jpg\" alt=\"15\" width=\"369\" height=\"72\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/15-1.jpg 369w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/15-1-300x59.jpg 300w\" sizes=\"auto, (max-width: 369px) 100vw, 369px\" \/><\/p>\n<p>The cat-and-mouse game between ransomware developers and security vendors goes on. We can expect ransomware to continue to display new evasion techniques.<\/p>\n<p>McAfee advises users to keep their antimalware signatures up to date at all times. McAfee products detect this malicious JavaScript and the Locky payload as JS\/Nemucod, and Ransomware-Locky.a!enc respectively,\u00a0with DAT Versions 8183 and later.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[338,180],"coauthors":[3973],"class_list":["post-50266","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-06T18:27:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T01:56:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"719\" \/>\n\t<meta property=\"og:image:height\" content=\"602\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript\",\"datePublished\":\"2016-06-06T18:27:53+00:00\",\"dateModified\":\"2025-06-03T01:56:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg\",\"keywords\":[\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/\",\"name\":\"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg\",\"datePublished\":\"2016-06-06T18:27:53+00:00\",\"dateModified\":\"2025-06-03T01:56:43+00:00\",\"description\":\"This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript | McAfee Blog","description":"This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript | McAfee Blog","og_description":"This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-06-06T18:27:53+00:00","article_modified_time":"2025-06-03T01:56:43+00:00","og_image":[{"width":719,"height":602,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript","datePublished":"2016-06-06T18:27:53+00:00","dateModified":"2025-06-03T01:56:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/"},"wordCount":706,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg","keywords":["endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/","name":"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg","datePublished":"2016-06-06T18:27:53+00:00","dateModified":"2025-06-03T01:56:43+00:00","description":"This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=50266"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50266\/revisions"}],"predecessor-version":[{"id":214921,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50266\/revisions\/214921"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=50266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=50266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=50266"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=50266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}