Jump to content

PyLocky Decryptor

Recommended Posts

This decryptor is intended to decrypt the files for those victims affected by the ransomware PyLocky.


This decryptor is built to be executed on Windows systems only and it does require a PCAP of the outbound connection attempt to the C&C servers. This connection is seen seconds after the infection occurs and it will contain, among other info, the Initialization Vector (IV) and a password (both generated randomly at runtime) used to encrypt the files. Without this PCAP containing these values, the decryption won't be possible.

The structure of the outbound connection contains an string like:



Download: https://github.com/Cisco-Talos/pylocky_decryptor


Source https://github.com/Cisco-Talos/pylocky_decryptor

Edited by OKQL
  • Upvote 4

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now