Ragnar Locker operates by using an eponymously named malware called
RagnarLocker. First, the
dropper (usually delivered through a vulnerability in
Remote Desktop Protocol) checks the
operating system. If it's set to a language used in the former Soviet Union, it stops. Otherwise, it starts by sending a copy of
system files to its central server and then downloads a package containing a version of
VirtualBox configured to display the host computer and an image of
Windows XP that contains the malware, which itself is only about 49 kB in size. The dropper, after disabling security-related services or services that could keep logs active (like
DBMS software), launches the virtual machine and the ransomware via a
batch script. The ransomware begins encrypting files on the host computer without raising suspicion, since the commands appear to come from VirtualBox rather than the ransomware itself. ==Arrests==