{"id":52360,"date":"2016-09-16T15:35:11","date_gmt":"2016-09-16T22:35:11","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52360"},"modified":"2025-06-02T18:55:43","modified_gmt":"2025-06-03T01:55:43","slug":"locky-ransomware-hides-inside-packed-dll","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/","title":{"rendered":"Locky Ransomware Hides Inside Packed .DLL"},"content":{"rendered":"<p>McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript\/\">an earlier blog).<\/a>\u00a0Locky is aggressively distributed via a JavaScript-based downloader sent as an attachment in spam emails. Since its first variant Locky has taken advantage of compromised domains to download its\u00a0malicious executable. Recently it has downloaded a malicious dynamic link library (DLL). By tracking these campaigns, we have noticed that Locky\u2019s authors use a seed parameter (\u201c323\u201d in this variant) from its JavaScript downloader to execute the malicious DLL.<\/p>\n<p>At first, the file looks like highly obfuscated JavaScript and is tough to understand. The script\u00a0<span style=\"font-style: inherit; font-weight: inherit;\">(hash:<\/span> E833713599E6014DFD808DA08BD8A452)\u00a0looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52361\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png\" alt=\"1\" width=\"894\" height=\"330\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-7.png 894w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-7-300x111.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-7-768x283.png 768w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><\/p>\n<p>We tried to deobfuscate by modifying the original script a bit. After the deobfuscation, we finally obtained more visible code. For easier\u00a0understanding we have arranged a\u00a0major part of the script in this sequence:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52362\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2-5.png\" alt=\"2\" width=\"1089\" height=\"595\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-5.png 1089w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-5-300x164.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-5-768x420.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-5-1024x559.png 1024w\" sizes=\"auto, (max-width: 1089px) 100vw, 1089px\" \/><\/p>\n<p>In the first four lines of the\u00a0script we can see the URLs of four compromised websites, from which the script tries to download the payload. The\u00a0script will try the next URL if the previous download fails.\u00a0If successful, it downloads the encoded payload, which at first looks like a junk file (hash: 5C5D55C1AEB06CA131EEF5BC19C3C1CD):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52363\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/3-4.png\" alt=\"3\" width=\"695\" height=\"348\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-4.png 695w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-4-300x150.png 300w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/p>\n<p>The decoded routine from the JavaScript decodes the junk file, resulting in a packed DLL. The characteristics of the decoded packed DLL:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52364\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/4-6.png\" alt=\"4\" width=\"667\" height=\"301\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-6.png 667w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-6-300x135.png 300w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/p>\n<p>The packed DLL has an export function &#8220;_WinMainExp@16.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52365\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/5-7.png\" alt=\"5\" width=\"561\" height=\"361\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-7.png 561w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-7-300x193.png 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/p>\n<p>While unpacking the DLL we came across following technique for obscuring virtual machines. In this technique the malware author checks the time difference between two API calls, GetProcessHeap () and CloseHandle (). At runtime it takes the address of CloseHandle () API by using LoadLibrary () and GetProcAddress (), as shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52540\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/11-2.jpg\" alt=\"11\" width=\"511\" height=\"514\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-2.jpg 511w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-2-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-2-298x300.jpg 298w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-2-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-2-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-2-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-2-128x128.jpg 128w\" sizes=\"auto, (max-width: 511px) 100vw, 511px\" \/><\/p>\n<p>In general, on a real system, CloseHandle () should be faster to execute than GetProcessHeap (). The author checks the time difference between these two APIs for validating the virtualization. The following code snippet explains:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52541\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/12-3.jpg\" alt=\"12\" width=\"630\" height=\"433\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/12-3.jpg 630w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/12-3-300x206.jpg 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52542\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/13-2.jpg\" alt=\"13\" width=\"836\" height=\"350\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/13-2.jpg 836w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/13-2-300x126.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/13-2-768x322.jpg 768w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/p>\n<p>We unpacked the malicious DLL, which shows the export function &#8220;qwerty.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52367\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/7-4.png\" alt=\"7\" width=\"560\" height=\"358\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-4.png 560w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-4-300x192.png 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>In line number\u00a06\u00a0the\u00a0ExpandEnvironmentStrings () method gets the %TEMP% location to store the downloaded DLL with a random name. The script also verifies the architecture of the machine from lines 11 to 18 by using an if-else statement:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52368\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/8-3.png\" alt=\"8\" width=\"949\" height=\"178\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-3.png 949w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-3-300x56.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-3-768x144.png 768w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><\/p>\n<p>According to the architecture of the machine, the script will run the DLL using Rundll32.exe. In line 22 we can see the process to run the DLL:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52369\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/9-3.png\" alt=\"9\" width=\"1525\" height=\"36\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-3.png 1525w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-3-300x7.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-3-768x18.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-3-1024x24.png 1024w\" sizes=\"auto, (max-width: 1525px) 100vw, 1525px\" \/><\/p>\n<p>The malware author uses the seed parameter to bypass execution in a sandbox. If the DLL is executed with the proper export function name (\u201cqwerty\u201d for this variant) and the required parameter (hardcoded \u201c323\u201d for this variant), only then will the DLL behave maliciously. Thus the\u00a0author is verifying the DLL is executed by the malicious parent JavaScript file. If parameters other than those\u00a0expected are passed, then the DLL will do nothing malicious and traditional sandboxes will fail to execute the DLL.<\/p>\n<p>We can see the hardcoded parameter \u201c323\u201d in the following snippet:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52370\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/10-3.png\" alt=\"10\" width=\"783\" height=\"526\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-3.png 783w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-3-300x202.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-3-768x516.png 768w\" sizes=\"auto, (max-width: 783px) 100vw, 783px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-52543\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/14-3.png\" alt=\"14\" width=\"688\" height=\"96\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/14-3.png 688w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/14-3-300x42.png 300w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/><\/p>\n<h2>McAfee&#8217;s Advice<\/h2>\n<p>]McAfee advises users to keep their antimalware signatures up to date at all times. McAfee products detect this malicious JavaScript, encoded payload, and packed DLL as JS\/Nemucod, Ransomware-Locky.d!enc, and Ransomware-FRO![Partial Hash], respectively, with DAT Versions 8270 and later.<\/p>\n<p><em>This post was prepared with the invaluable assistance of Girish Kulkarni and G N Sivagnanam.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).\u00a0Locky is aggressively&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,338,180,4549],"coauthors":[3973],"class_list":["post-52360","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-endpoint-protection","tag-malware","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Locky Ransomware Hides Inside Packed .DLL | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).\u00a0Locky is aggressively distributed via a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Locky Ransomware Hides Inside Packed .DLL | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).\u00a0Locky is aggressively distributed via a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-16T22:35:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T01:55:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"894\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Locky Ransomware Hides Inside Packed .DLL\",\"datePublished\":\"2016-09-16T22:35:11+00:00\",\"dateModified\":\"2025-06-03T01:55:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/\"},\"wordCount\":557,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png\",\"keywords\":[\"computer security\",\"cybercrime\",\"endpoint protection\",\"malware\",\"ransomware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/\",\"name\":\"Locky Ransomware Hides Inside Packed .DLL | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png\",\"datePublished\":\"2016-09-16T22:35:11+00:00\",\"dateModified\":\"2025-06-03T01:55:43+00:00\",\"description\":\"McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).\u00a0Locky is aggressively distributed via a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Locky Ransomware Hides Inside Packed .DLL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Locky Ransomware Hides Inside Packed .DLL | McAfee Blog","description":"McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).\u00a0Locky is aggressively distributed via a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Locky Ransomware Hides Inside Packed .DLL | McAfee Blog","og_description":"McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).\u00a0Locky is aggressively distributed via a","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-09-16T22:35:11+00:00","article_modified_time":"2025-06-03T01:55:43+00:00","og_image":[{"width":894,"height":330,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-7.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Locky Ransomware Hides Inside Packed .DLL","datePublished":"2016-09-16T22:35:11+00:00","dateModified":"2025-06-03T01:55:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/"},"wordCount":557,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png","keywords":["computer security","cybercrime","endpoint protection","malware","ransomware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/","name":"Locky Ransomware Hides Inside Packed .DLL | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png","datePublished":"2016-09-16T22:35:11+00:00","dateModified":"2025-06-03T01:55:43+00:00","description":"McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog).\u00a0Locky is aggressively distributed via a","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-7.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/locky-ransomware-hides-inside-packed-dll\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Locky Ransomware Hides Inside Packed .DLL"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52360"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52360\/revisions"}],"predecessor-version":[{"id":214920,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52360\/revisions\/214920"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52360"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}