This document summarizes the OSX.KeRanger ransomware. It begins by describing how the ransomware attaches itself as a disk image and drops a file called General.rtf. It then analyzes how General.rtf is UPX packed and unlinks itself to hide. It explains how the ransomware daemonizes and waits before generating a UUID and communicating with its command and control server to receive an RSA public key and ransom statement. Finally, it details how the ransomware encrypts files based on specific file extensions except for a few file types like README_FOR_DECRYPT.txt.