Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Interlock

145
Global rank
126 infographic chevron month
Month rank
154 infographic chevron week
Week rank
0
IOCs

Interlock is a relatively recent entrant into the ransomware landscape. First identified in 2023, it's a multi-functional malware strain used in ransomware-as-a-service (RaaS) operations.

Ransomware
Type
Unknown
Origin
1 October, 2023
First seen
14 September, 2025
Last seen

How to analyze Interlock with ANY.RUN

Type
Unknown
Origin
1 October, 2023
First seen
14 September, 2025
Last seen

IOCs

IP addresses
45.61.136.228
84.200.24.41
178.156.129.27
167.235.235.151
138.199.161.141
168.119.96.41
216.245.184.181
177.136.225.135
159.69.3.151
212.237.217.182
45.61.136.202
193.36.38.237
5.161.225.197
91.99.10.54
138.199.156.22
95.217.22.175
128.140.120.188
49.12.69.80
188.34.195.44
162.55.47.21
Domains
agencylumtorin.com
accomplishlearningjourney.com
nextgenacademyquest.com
discoverlearnachieve.com
cognizorikpathways.com
elevatedlearningpathway.com
kyrenthadesign.com
skillgleamm.com
insightglint.com
knowledgepathfinderhub.com
coursebreezere.com
colventriaweb.com
edupulserikquest.com
braineflux.com
learnverve.com
studizoriklearn.com
studipulserikjourney.com
learnripple.com
academicpathfinderhub.com
cogniluxorikpathways.com
Last Seen at

Recent blog posts

post image
ANY.RUN Sandbox & Microsoft Sentinel: Les...
watchers 411
comments 0
post image
Fighting Telecom Cyberattacks: Investigating...
watchers 1808
comments 0
post image
Efficient SOC: How to Detect and Solve Incide...
watchers 912
comments 0

What is Interlock malware?

Interlock is a modular ransomware tool that enables hackers to lock and encrypt files, exfiltrate data, and demand ransoms in double extortion schemes. It targets both Windows and Linux systems, with 64-bit executables (Windows PE and Linux ELF formats).

Interlock gained attention for its stealth and customizability, starting from targeting small and midsize enterprises with limited cybersecurity maturity and proceeding to industry leaders for really big ransoms. Healthcare organizations are another common victim of Interlock.

Discover detailed investigation into Interlock attacks on U.S. hospitals and healthcare providers.

Like many modern malware strains, Interlock leverages common but effective attack vectors. Adversaries send malicious attachments or links in well-crafted spear phishing messages, sometimes including QR codes or cloud-sharing links to bypass email filters. They exploit vulnerabilities, purchase credentials from initial access brokers and employ malvertising — drive-by downloads from fake ads or compromised legitimate websites.

Upon a successful infiltration, Interlock exploits active directory misconfigurations and uses PowerShell, WMI, and RDP for lateral movement within the network. Having established itself in the system, it dumps credentials from memory, exfiltrates data before encryption (double extortion), encrypts data with strong algorithms (often AES or ChaCha20) and greets the victim with a customized ransom note. Optionally, Interlock can recruit keyloggers, browser data collectors, and screenshot capturing.

The malware affects both Windows and Linux environments, with binaries tailored for each, indicating broad compatibility and intent to hit diverse infrastructures. It may use scheduled tasks or registry modifications to maintain access, ensuring it can resume operations after a reboot.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Interlock Ransomware’s Prominent Features

Interlock poses significant risks due to its:

  • Sector Impact: Healthcare and government sectors are particularly vulnerable due to their reliance on uptime and data confidentiality. Disruptions can lead to life-threatening delays or exposure of classified information.
  • Big-Game Hunting: Interlock targets high-value organizations, demanding large ransoms, but can also cripple smaller entities or those with limited cybersecurity budgets.
  • Broad Targeting: Its ability to hit both Windows and Linux systems makes it a threat to diverse environments, from enterprise servers to critical infrastructure.
  • Double-Extortion Strategy: The threat of data leaks amplifies financial and reputational damage, especially for organizations handling sensitive data.
  • Persistence: Its ability to maintain access increases the risk of repeated attacks or secondary payloads.

Interlock is notable for deploying a rare FreeBSD encryptor, aiming at critical infrastructure servers (e.g., web hosting, mail servers). While specific FreeBSD attacks are not yet detailed, this capability suggests potential for broader disruption in future incidents.

Interlock’s Execution Process and Technical Details

To watch Interlock enforce its varying attack scenarios, search for this malware via ANY.RUN’s Threat Intelligence Lookup and explore the analyses of its samples publicly submitted in the Interactive Sandbox.

threatName:"interlock"

Interlock ransomware samples in ANY.RUN Sandbox Interlock ransomware analyses in ANY.RUN's Interactive Sandbox

Let’s watch one of the analysis sessions closer

The execution chain of Interlock ransomware unfolds in several stages, employing both deception and sophisticated tools to compromise and extort victims. It typically begins with a drive-by compromise, where users are tricked into visiting phishing websites that appear legitimate. These sites offer fake updates or tools, which, once downloaded, infect the user’s device with malware. For example, malicious software might be disguised as a legitimate update for a popular application such as Chrome or Microsoft Edge. In one observed instance, the executable file was named upd_9488679.exe, where upd is short for “update,” although it can also appear under names like Update or ChromeSetup.

Once inside the system, attackers may deploy malicious payloads or execute harmful commands to take full control of the victim’s network. Prior to encryption, they often exfiltrate sensitive data as part of a double extortion strategy, threatening not only to encrypt the data but also to release the stolen information publicly if the ransom is not paid.

Next, the Interlock ransomware encryptor is deployed, appending the .interlock extension to files and dropping a ransom note titled !README!.txt in affected directories. This note typically provides instructions on how to contact the attackers and pay the ransom. The reliance on double extortion further pressures victims, who risk losing both access to their data and control over the disclosure of sensitive information.

Following its main functions, the ransomware may erase Windows event logs to conceal evidence of its activities. It can also delete its own binary after encryption, further complicating forensic analysis and recovery efforts.

Interlock ransomware analysis in ANY.RUN A sample of Interlock detonated inside ANY.RUN's Interactive Sandbox

What are the examples of the best-known Interlock attacks?

  • Wayne County, a government entity in Michigan, was hit by Interlock in early October 2024. The breach disrupted local government operations, potentially affecting public services. Interlock demanded a ransom, reportedly ranging from hundreds of thousands to millions of dollars, though it’s unclear if the ransom was paid.
  • Brockton Neighborhood Health Center was breached by Interlock, with the attack going undetected until December 17, 2024. Attackers used a fake Google Chrome updater to gain initial access, deploying a remote access tool (RAT) to exfiltrate sensitive patient data and encrypt files. The delayed detection allowed Interlock to maintain persistence for nearly two months.
  • Interlock claimed responsibility for attacking Andretti Indoor Karting & Games — a U.S. entertainment chain — in March 2025, alleging they stole 1.2 TB of data, including W-9 forms, financial records, and passports. The attack led to a temporary closure of multiple locations. This attack showed Interlock’s willingness to target non-critical sectors like entertainment, broadening their victim pool.

Gathering Threat Intelligence on Interlock malware

Integrating threat intelligence into security operations is much more efficient than paying huge ransoms to Interlock operators or dealing with devastating aftermath of data loss and leaks. Focus on TTPs (tactics, techniques, procedures) shared by TI reports, such as phishing, scheduled tasks to anticipate attack vectors.

Leverage ANY.RUN’s Threat Intelligence Lookup to hunt for IOCs specific to Interlock, like domains, IPs, or file hashes.

Each analysis session in the Sandbox contains a number of IOCs. Use them as search requests to TI Lookup for further exploring the threat and gathering data for monitoring and detection.

Interlock malicious files Files found in an Interlock sample during Sandbox analysis

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Interlock is a young ransomware market player yet already notorious for its big ransom appetites, opportunistic targeting across various sectors, and sophisticated tactics to infiltrate systems, exfiltrate data, and disrupt operations. The group's activities have had significant impacts on the affected organizations, leading to operational downtime, data breaches, and potential financial losses.

To avoid becoming the next victim, reinforce your proactive cybersecurity efforts with actionable data brough to you by threat intelligence.

Start with 50 requests in TI Lookup to collect IOCs on Interlock and be ready to detect and respond

HAVE A LOOK AT

MassLogger screenshot
MassLogger
masslogger
MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA.
Read More
DarkTortilla screenshot
DarkTortilla
darktortilla
DarkTortilla is a crypter used by attackers to spread harmful software. It can modify system files to stay hidden and active. DarkTortilla is a multi-stage crypter that relies on several components to operate. It is often distributed through phishing sites that look like real services.
Read More
Razr screenshot
Razr
razr
Razr is a destructive ransomware that infiltrates systems to encrypt files, rendering them inaccessible to users. It appends the ".razr" extension to the encrypted files and drops a ransom note, typically named "README.txt," instructing victims on how to pay the ransom to obtain the decryption key. The malware often spreads through phishing emails with malicious attachments or by exploiting vulnerabilities in software and operating systems. Razr employs strong encryption algorithms, making it challenging to decrypt files without the attackers' key.
Read More
Virlock screenshot
Virlock
virlock
Virlock is a unique ransomware strain that combines encryption capabilities with file infection techniques. First observed in 2014, it stands out due to its polymorphic nature and ability to embed its code into compromised files, ensuring continued propagation. Once it infects a system, it encrypts files and locks the screen, demanding a ransom for file recovery and system access.
Read More
Wshrat screenshot
Wshrat
wshrat rat trojan
WSHRAT is a Remote Access Trojan — a malware that allows the attackers to take over the infected machines. The RAT has been in circulation since 2013 and it is arguably most notable for the numerous versions released into the wild.
Read More
zgRAT screenshot
zgRAT
zgrat
zgRAT is a malware known for its ability to infect systems and exfiltrate sensitive data to command-and-control (C2) servers. It is primarily distributed through loader malware, as well as phishing emails. zgRAT employs various advanced techniques, including process injection and code obfuscation, to evade detection and maintain persistence on infected systems. The malware can also spread via USB drives and uses popular messaging platforms like Telegram and Discord for data exfiltration.
Read More