LambdaLocker Ransomware - Remove and Restore .lambda_l0cked Files

LambdaLocker Ransomware – Remove and Restore .lambda_l0cked Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article will aid you to remove LambdaLocker ransomware completely. Follow the ransomware removal instructions given at the bottom of the article.

LambdaLocker ransomware is a cryptovirus which has been targeting mainly Chinese users, according to malware researchers. Your files will get encrypted and receive the .lambda_l0cked extension after the encryption process is done. Afterward, the LambdaLocker ransomware displays a ransom note with instructions for paying the ransom. Read through to see with what ways you can try to potentially restore some of your files.

Threat Summary

Short DescriptionThe ransomware encrypts files on your computer allegedly with AES-256 and SHA-256 encryption algorithms.
SymptomsThe ransomware will encrypt your files and put the .lambda_l0cked extension on all files after encryption completes.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by LambdaLocker


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss LambdaLocker.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

LambdaLocker Ransomware – Distribution

The LambdaLocker ransomware can be distributed by utilizing various methods. The most common way of distribution is probably by a file that drops the payload of the ransomware, which contains the malicious script of the virus.

LambdaLocker could also be distributing that payload dropper on social media networks and file-sharing sites. Freeware programs found on the Web could be promoted as helpful but also could be hiding the downloader for the payload. Do not open files right after you have downloaded them, especially if they come from a suspicious source, like an e-mail from an unknown sender. Instead, you should first scan those files with a security program and check their size and signatures for each of file for anything that seems unusual. You should read the tips for preventing ransomware topic.

LambdaLocker Ransomware – Information

LambdaLocker ransomware is also a cryptovirus. China seems to be the primary country that it is currently targeting, according to malware researchers. There is also the evidence that the ransom note has a variant written in the Chinese language. That doesn’t mean that other countries are excluded from its crosshairs – everybody can become a victim. The ransomware will encrypt files on your computer system and append the same extension to all of them when the encryption process finishes.

LambdaLocker ransomware could make new entries in the Windows Registry to achieve perseverance. Those registry entries are usually placed for the reason to start the virus automatically with each boot of the Windows Operating System.

The ransom note will appear after the encryption process is fully completed. The note states what the demands of the cybercriminals are, like what is the price of the ransom and all other instructions for decrypting your data. The note is contained in a file called READ_IT.hTmL. You can preview the ransom note in the screenshot provided down below:

The ransom note reads:

Your files are encrypted by the LambdaLocker.
Your ID: [Redacted] We used AES-256 and SHA-256 cipher to encrypt. So DO NOT try to crack your files.
The way to DECRYPT:
Step1: pay 0.5 Bitcoin to 1MJod*** (Case Sensitive, Please copy this address) in 1 month.
Step2: send an E-MAIL to after you finish step 1
Subject: decryptLL
Body: [Your ID]P05 (Example:[1234-1234-1234]P05)
Step3: Please wait. We will send the decrypter and the key to you in 3 hours.
How to get Bitcoins and pay?
1. Register a Bitcoin Trade Platform.
2. Buy Bitcoins through the platform.
3. Pay 0.5 Bitcoins to 1MJodDvhmNG9ocRhhwvBzkGmttXP9ow7e2 and follow the decrypt step.
If you can’t understand, please Google: How can I buy and pay bitcoin?
Bitcoin Trade Platform recommend:
1. HuoBi (火币,China):
2. BtcTrade (China):
3. OKCoin:
4. Bter:
5. JuBi (聚币,China):
6. Btc100 (China):
7. BTC-e:
8. Bitstamp:
9. GDAX:
10. CEX:
Or you can use others.
If you have any questions, please e-mail

The note for Chinese users reads the following:

您的ID : 4530-1099-2139-5329
第一步:在一个月内支付0.5比特币到地址 1MJodDvhmNG9ocRhhwvBzkGmttXP9ow7e2 (区分大小写,请完整地复制)
邮件内容:[您的ID]P05 (举例:[1234-1234-1234]P05)

The criminals that stand behind the LambdaLocker ransomware virus want 0.5 BitCoin for decryption, which is a bit more than 400 US dollars. You should NOT under any circumstances pay these criminals. Nobody can guarantee if your files will get restored back to normal. Plus, you should not ever give money to criminals, as this will probably just support them and inspire them to make other ransomware viruses or do more criminal activities.

At this time, there is no existing list with file extensions that the LambdaLocker ransomware searches to encrypt. The article will get updated if any information on that matter surfaces.

Each file that gets encrypted will receive the same extension appended to each of them, which is .lambda_l0cked. The encryption algorithm is a mixture of the 256-bit AES and 256-bit SHA algorithms or at least, that is what is says in the ransom note.

The LambdaLocker cryptovirus is very likely to delete the Shadow Volume Copies from the Windows operating system by using this command in the Command Prompt:

→vssadmin.exe delete shadows /all /Quiet

Keep on reading and check out what kind of ways you can try to potentially restore some of your data.

Remove LambdaLocker Ransomware and Restore .lambda_l0cked Files

If your computer got infected with the LambdaLocker ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share