LockLock targets Windows OS and is an EDA2-based ransomware variant. The method of distribution is currently unknown. LockLock encrypts files using AES-256 and appends .locklock to the names of encrypted files. It requests the victim contact the attacker via email or skype, at the addresses provided on the ransom note. The ransom payment demand for LockLock is currently unknown.