9397
9397
"description": "Ransomware encrypts disk partitions PDFBewerbungsmappe.exe",
9398
9398
"meta": {
9399
9399
"encryption": "Modified Salsa20",
9400
+ "links": [
9401
+ "http://petya37h5tbhyvki.onion",
9402
+ "http://petya5koahtsf7sv.onion"
9403
+ ],
9400
9404
"payment-method": "Bitcoin - Website (onion)",
9401
9405
"ransomnotes-filenames": [
9402
9406
"YOUR_FILES_ARE_ENCRYPTED.TXT"
9405
9409
"http://www.thewindowsclub.com/petya-ransomware-decrypt-tool-password-generator",
9406
9410
"https://www.youtube.com/watch?v=mSqxFjZq_z4",
9407
9411
"https://blog.malwarebytes.org/threat-analysis/2016/04/petya-ransomware/",
9408
- "https://www.bleepingcomputer.com/news/security/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme/"
9412
+ "https://www.bleepingcomputer.com/news/security/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme/",
9413
+ "https://www.ransomlook.io/group/petya"
9409
9414
],
9410
9415
"synonyms": [
9411
9416
"Goldeneye"
11001
11006
".xort",
11002
11007
".trun"
11003
11008
],
11009
+ "links": [
11010
+ "http://restoredz4xpmuqr.onion"
11011
+ ],
11004
11012
"payment-method": "Bitcoin",
11005
11013
"price": "0.438",
11006
11014
"ransomnotes-filenames": [
11010
11018
"<random>.hta | VAULT.hta"
11011
11019
],
11012
11020
"refs": [
11013
- "http://www.nyxbone.com/malware/russianRansom.html"
11021
+ "http://www.nyxbone.com/malware/russianRansom.html",
11022
+ "https://www.ransomlook.io/group/vaultcrypt"
11014
11023
],
11015
11024
"synonyms": [
11016
11025
"CrypVault",
14744
14753
"http://npkoxkuygikbkpuf5yxte66um727wmdo2jtpg2djhb2e224i4r25v7ad.onion",
14745
14754
"http://6v4q5w7di74grj2vtmikzgx2tnq5eagyg2cubpcnqrvvee2ijpmprzqd.onion/remote0/",
14746
14755
"http://l4rdimrqyonulqjttebry4t6wuzgjv5m62rnpjho3q22a6maf6d5evyd.onion/",
14747
- "http://frgp3f3u2ddafv4ny7tqn6tc674m6fyymyywoaxot7xskbjmiyhhsyqd.onion/"
14756
+ "http://frgp3f3u2ddafv4ny7tqn6tc674m6fyymyywoaxot7xskbjmiyhhsyqd.onion/",
14757
+ "http://htmxyptur5wfjrd7uvg23snupub2pbtlfelk45n37b3augl2w4eearid.onion/remote0/"
14748
14758
],
14749
14759
"ransomnotes-filenames": [
14750
14760
"ClopReadMe.txt",
25422
25432
},
25423
25433
{
25424
25434
"description": "ransomware",
25435
+ "meta": {
25436
+ "links": [],
25437
+ "refs": [
25438
+ "https://www.ransomlook.io/group/zeppelin"
25439
+ ]
25440
+ },
25425
25441
"uuid": "bc62429c-1bf7-42c0-997d-d8c2f80355de",
25426
25442
"value": "Zeppelin"
25427
25443
},
27681
27697
"http://databasebb3.top/",
27682
27698
"http://l6zxfn3u2s4bl4vt3nvpve6uibqn3he3tgwdpkeeplhwlfwy3ifbt5id.onion/",
27683
27699
"http://onlylegalstuff6.top/",
27684
- "https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/"
27700
+ "https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/",
27701
+ "http://bpeln2aqs66qqfuex2cvcyjiy5ggcwbyh5nbmxzxt6daamkmpmufv4qd.onion/",
27702
+ "http://ond5arqab77n6tykvi4aqp7oqegqdfgqfyf7fzyhfyhmbp7iafpzdtad.onion/"
27685
27703
],
27686
27704
"ransomnotes": [
27687
27705
"Your data are stolen and encrypted\nThe data will be published on TOR website if you do not pay the ransom\nYou can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565y1u2c6Lay6yfiebkcbtvvcytyolt33s77xypi7nypxyd.onion/ \n\nYour company id for log in: [REDACTED]"
29609
29627
"http://myosbja7hixkkjqihsjh6yvmqplz62gr3r4isctjjtu2vm5jg6hsv2ad.onion/chat",
29610
29628
"http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion",
29611
29629
"http://monti5o7lvyrpyk26lqofnfvajtyqruwatlfaazgm3zskt3xiktudwid.onion",
29612
- "http://il6jcce6f5htppc3smu4olpt5pz3akdg5h7k7tb4n45jixxu2o2oxlid.onion/"
29630
+ "http://il6jcce6f5htppc3smu4olpt5pz3akdg5h7k7tb4n45jixxu2o2oxlid.onion/",
29631
+ "http://cls2wzky5vxgu54fg4fqdj4q4olyvmwt6rinmtgqsq5d3vubv7bdzgqd.onion/"
29613
29632
],
29614
29633
"refs": [
29615
29634
"https://www.ransomlook.io/group/monti"
29863
29882
"ftp://dataShare:
[email protected] ",
29864
29883
"https://31.41.244.100/",
29865
29884
"http://ijzn3sicrcy7quixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvad.onion",
29866
- "http://kbsqoiyihadmwczmxkbovk7ss2dcynitwhhfu5yw725dbogo5kthfaad.onion"
29885
+ "http://kbsqoiyihadmwczmxkbovk7ss2dcynitwhhfu5yw725dbogo5kthfaad.onion",
29886
+ "http://ftp://dataShare:
[email protected] ",
29887
+ "http://ftp://dataShare:
[email protected] "
29867
29888
],
29868
29889
"refs": [
29869
29890
"https://www.ransomlook.io/group/qilin"
30040
30061
"http://zv7u2tclxajbgae6ba4jkisnkfkts3lk7lxlypmuqktrk42qmo2c7hqd.onion/",
30041
30062
"http://secxrosqawaefsio3biv2dmi2c5yunf3t7ilwf54czq3v4bi7w6mbfad.onion/",
30042
30063
"http://cqwdv5rxut5l3blbeg74ddfo6ya65xsxqan7vawffdng6ynd2kulfkqd.onion/",
30043
- "http://nlqnxzqixcwazwyib4bft2m6ikjrtihh4qgdtnmpmbi3meio5jj2xsad.onion/"
30064
+ "http://nlqnxzqixcwazwyib4bft2m6ikjrtihh4qgdtnmpmbi3meio5jj2xsad.onion/",
30065
+ "http://naurcsrhvsnxotv5awcsmddlcwgv447fvolmkyo6gfgszvtofijd6oid.onion/"
30044
30066
],
30045
30067
"refs": [
30046
30068
"https://www.ransomlook.io/group/ransomhouse"
31191
31213
"http://d2wqt4kek62s35hjeankc75nis4zn4e5i6zdtmfkyeevr7fygpf2iiid.onion",
31192
31214
"http://sclj2rax5ljisew3v4msecylzo7iieqw25kcl7io4szei4qcujxixaid.onion",
31193
31215
"http://xyy2fymbdytltylyuicasuvw7vw3gtgm3cvvjskh4jnzfg3gp7dqgnqd.onion",
31194
- "http://heac3upmfv33scnkeek64dqdx2cblv7z256aezluyvgtwsxi2o3coiid.onion/"
31216
+ "http://heac3upmfv33scnkeek64dqdx2cblv7z256aezluyvgtwsxi2o3coiid.onion/",
31217
+ "http://uss2a5zyeth7sop57zhgqcyafmnbkmoknps3i7anusze77zppp4bf5yd.onion/"
31195
31218
],
31196
31219
"refs": [
31197
31220
"https://www.ransomlook.io/group/cloak"
32072
32095
"value": "c3rb3r"
32073
32096
},
32074
32097
{
32098
+ "description": "",
32075
32099
"meta": {
32076
32100
"links": [
32077
32101
"http://6n5tfadusp4sarzuxntz34q4ohspiaya2mc6aw6uhlusfqfsdomavyyd.onion",
32170
32194
"http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion",
32171
32195
"http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion",
32172
32196
"http://medusakxxtp3uo7vusntvubnytaph4d3amxivbgg13hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24",
32173
- "http://hm2hlugduzuxiya5bgrsewfxmrzxbmslvg3t42zdzsorcn2nyfbrh6qd.onion/"
32197
+ "http://hm2hlugduzuxiya5bgrsewfxmrzxbmslvg3t42zdzsorcn2nyfbrh6qd.onion/",
32198
+ "http://7aqabivkwmpvjkyefonf3gpy5gsubopqni7kcirsrq3pflckxq5zz4id.onion/"
32174
32199
],
32175
32200
"ransomnotes-filenames": [
32176
32201
"!!!READ_ME_MEDUSA!!!.txt"
32757
32782
"http://brclvwefzszko5xrlan7pebyliqdkv5cw75xksrxp772urjytkko5fyd.onion",
32758
32783
"http://rmr2kgq6vzifnyoaz7jaxdx5t6gsxurbakah5bafatsqldtt2mwneyid.onion",
32759
32784
"http://xdg53hbpwshgtbfbm6m7nv3ckkduo3dfdwdearcsvybfb3qaf4v7suyd.onion",
32760
- "http://toq7bk6abkr6lapwj3k22ffu4ud5jpox7jbfgzetpz7lxb427katstid.onion"
32785
+ "http://toq7bk6abkr6lapwj3k22ffu4ud5jpox7jbfgzetpz7lxb427katstid.onion",
32786
+ "http://tjnt7x2xodhthwrfnabhloogoo66jrgohgzpta22uwbqznsvrm5tu4id.onion/",
32787
+ "http://fvixrjsdk2adazfnz4mrdvr4eznm346fk33y7nos65bdrtmfvw7f5vid.onion/",
32788
+ "http://vhxbjx4iaeqgna22kqt5ajlqi72vbm6qcjev3efgr5oiklgptvjvjhqd.onion/",
32789
+ "http://yszafmehxkoa7hrcay7cnyogfrmjqc4grds6innadspii5oz6fneyzyd.onion/",
32790
+ "http://i4xita2momkw2jitqohbqgomjxqp53pyvgv5gbogvendbx3ucnynekyd.onion/",
32791
+ "http://3ysbtsnhldlijvfdv7hwkr2gl3op2d56puspeo4whs6p272sde6fq5id.onion/",
32792
+ "http://bd3atkmicmcif6mliquqdxltjq6mxvagw44gealayp34awtcx3ywlxid.onion/",
32793
+ "http://biurt7anlhkncf2t3dvvtlszpnnyg3oiksyapcikxostz6zfrh4csvid.onion/",
32794
+ "http://bzfp6qfir7bfqjxnpgofwvfzoyca7kmcsfliot5zzfsas6oofwo7zoad.onion/",
32795
+ "http://fmcrlb2t524cpiiqiudbvdjmgvaczix2o5y5uc3zvi57niiyl467qgyd.onion/",
32796
+ "http://gsqxzyynjegp73imth5p3ug4etgbehd3pb72e4zmiro4st3s2nlkmgyd.onion/",
32797
+ "http://hjs27fuzq4j4gzshhbakt274eewxv2qdwmeugjx5eepwoaecczdkiiyd.onion/",
32798
+ "http://i2agsvbyoy3viwel7ucjqtzcq3ocsj3jqqew5wlwpxty6uxd455qkoqd.onion/",
32799
+ "http://kfvsqtlnfa5iiweywpubtqk4c2omc2vu4hvy26mhanaahtvpifzuxlid.onion/",
32800
+ "http://l5hzzorh57w4wp5va4ouye77x5f2apqd6rvvh3tb2a7vcenn6c5a2fad.onion/",
32801
+ "http://ljxmkfr6kl3ovwgkxycdrvvdf6tk7qdhgowcjkpsiocg7j5uuhmszyyd.onion/",
32802
+ "http://red46f427ed4ogc76gscsqrytpdh4gy5reh2g6dzjpbm24k3ns2t27qd.onion/",
32803
+ "http://xznhtihjpaz3rwcgwqrv3jipbbivlg5ttsdqoet55xe5a3nbxi47jwqd.onion/",
32804
+ "http://y2hkrrb7aba2pgyvpfzqj3vlhbw7e2wj2t2wvtlmkr54yqz7p5ghnfid.onion/",
32805
+ "http://yvst24dvz66unqqes6se3p3flxyzbtohaz6faknu5ne3zzeq2jumpiid.onion",
32806
+ "http://sres5y2sze7lqkk5s4ahns5lhvc7nr5hqy5lchbxcvhaty2hnivdacqd.onion"
32761
32807
],
32762
32808
"refs": [
32763
32809
"https://www.ransomlook.io/group/ransomhub"
33728
33774
"http://4q5tsu5o3msmv4am4dfhupwhzlyg7wv3lpswbvbhcrknr4ega7xetxad.onion/",
33729
33775
"http://z2b75lk7xf6kme3zfvlmdmpwiaansnkcuhsojd23dgub5md24fhogcyd.onion/",
33730
33776
"http://7lxwbzlkpjyuahuvngwwkc4mycj2a4flh45ksqjo2ezfdbkmxmlxikad.onion/",
33731
- "http://7watkqnnuwxvlpgy5gaosgqy67nve3jgpy37xobqngmswz3vuvde56yd.onion/"
33777
+ "http://7watkqnnuwxvlpgy5gaosgqy67nve3jgpy37xobqngmswz3vuvde56yd.onion/",
33778
+ "http://5dw7bszmidrhpoltqbqmpixpz6mvgez3mr6xc7ktval2glrmbxkwopad.onion/",
33779
+ "http://a3kvb22nuhfgaluy6uzufrjn3azzsu7tylszdbyne3kiextdmxz4nnyd.onion"
33732
33780
],
33733
33781
"refs": [
33734
33782
"https://www.ransomlook.io/group/embargo"
33903
33951
"http://mybmtbgd7aprdnw2ekxht5qap5daam2wch25coqerrq2zdioanob34ad.onion/",
33904
33952
"http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/",
33905
33953
"http://cuuhrxbg52c5agytmtjpwfu7mrs4xtaitc4mukkiy2kqdxeqbcmuhaid.onion/",
33906
- "http://p6wmotxzvg34tdmpwm4beqgrcyp5iys43snkccsahnw74la3k3xx6pad.onion"
33954
+ "http://p6wmotxzvg34tdmpwm4beqgrcyp5iys43snkccsahnw74la3k3xx6pad.onion",
33955
+ "http://brain4zoadgr6clxecixffvxjsw43cflyprnpfeak72nfh664kqqriyd.onion/",
33956
+ "http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/c/lgc2Yxua65agt4XMOMkQKJjsdrV2IzYk",
33957
+ "http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/"
33907
33958
],
33908
33959
"ransomnotes-filenames": [
33909
33960
"added_extension.README.txt",
34318
34369
"value": "orca"
34319
34370
},
34320
34371
{
34372
+ "description": "",
34321
34373
"meta": {
34322
34374
"links": [
34323
34375
"http://hackerosyolorz77y7vwj57zobwdeuzydhctz3kuuzr52ylzayvxuqyd.onion"
34363
34415
"http://bf7dw4n6zne6rbgjlpcsidphpk753nkyubipkym5t4pntgfyb6clw2qd.onion/login",
34364
34416
"http://nxarphaf35qp2uuosaq54m3a2s5kt4svpcv56mvz6r7xy6na7uo5ypyd.onion/",
34365
34417
"http://bxi2cepk57dy3uhgwqd6dri6jtuqe7btay225rn6xkvvgnp2cvjvowqd.onion/",
34366
- "http://2idvzxbwvzbxhuniw7kfaimcvtqazmn7nmuw7codg65cshwwsvnpz7id.onion/"
34418
+ "http://2idvzxbwvzbxhuniw7kfaimcvtqazmn7nmuw7codg65cshwwsvnpz7id.onion/",
34419
+ "http://xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion"
34367
34420
],
34368
34421
"refs": [
34369
34422
"https://www.ransomlook.io/group/nitrogen"
34473
34526
"http://zmdmlidqqrxbkyqkqttbsbticjbofjs5uzwecqvdxfadvsjw7mp5kjyd.onion",
34474
34527
"http://tyrvuuh5tvrvk4x6lfxrvgabqmzpnxehelmdqztu3vekujcknvl2ufad.onion/",
34475
34528
"http://k5pmfzuqwxr2uhnskktjicbnzr633zejupe54yginljj3mgoysfwe4id.onion/",
34476
- "http://65bhkrfbqnfjgcsr7456luzjauw5nikuwxradlysivy5wbttjikdhxid.onion/"
34529
+ "http://65bhkrfbqnfjgcsr7456luzjauw5nikuwxradlysivy5wbttjikdhxid.onion/",
34530
+ "http://k6oor2g5bfvdxhxr2g6fczu3iqldbzyavydk56lh6z7ex7n7wqg4eryd.onion/",
34531
+ "http://tpwgxrocjvlonhrfjm4jx3dore2u4brxfj4ikt7iba36c23svthhf7ad.onion/"
34477
34532
],
34478
34533
"refs": [
34479
34534
"https://www.ransomlook.io/group/interlock"
34502
34557
"http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion",
34503
34558
"http://r7i4vprxr2vznmhnnxj36264ofwx6extopdz535f5v357nqacifymbad.onion/",
34504
34559
"http://hellcat.rw",
34505
- "http://hcatxn4ppkgmakaatrq6bsbhqk5ouhviygyx57gljjt5iseul5nvpayd.onion"
34560
+ "http://hcatxn4ppkgmakaatrq6bsbhqk5ouhviygyx57gljjt5iseul5nvpayd.onion",
34561
+ "http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion/api2.php?action=victims"
34506
34562
],
34507
34563
"refs": [
34508
34564
"https://www.ransomlook.io/group/hellcat"
35691
35747
"description": "Kraken leak blog (hellokitty)",
35692
35748
"meta": {
35693
35749
"links": [
35694
- "http://krakenccj3wr23452a4ibkbkuph4d6soyx2xgjoogtuamc3m7u7wemad.onion/"
35750
+ "http://krakenccj3wr23452a4ibkbkuph4d6soyx2xgjoogtuamc3m7u7wemad.onion/",
35751
+ "http://zq3k4odlfpbzc5y4sxqgolivelxepceaakru3xqo4ll2czmvvtek2ryd.onion/",
35752
+ "http://t3uouzfvsaqurb2rzoe2mkpetp54d7lgtl45ply34v5lugsnzysmkhid.onion/",
35753
+ "http://xbupelqsy7lubogl6kdtdqguxoleehbxnuuqm2dos6bbmdwablpqckad.onion/"
35695
35754
],
35696
35755
"refs": [
35697
35756
"https://www.ransomlook.io/group/kraken"
36482
36541
"value": "late.lol"
36483
36542
},
36484
36543
{
36544
+ "description": "",
36485
36545
"meta": {
36486
36546
"links": [
36487
36547
"http://fdevb3qh24ak7wujqsf7co4z6fstm5qxvnkkgs62fayztjfjjtqqgsad.onion/"
@@ -36505,7 +36565,120 @@
36505
36565
},
36506
36566
"uuid": "a88c7ffe-a9e1-5961-bbfa-22725789fd86",
36507
36567
"value": "tooda"
36568
+ },
36569
+ {
36570
+ "description": "",
36571
+ "meta": {
36572
+ "links": [
36573
+ "http://fonektibq4fbgergrorw43yawhz3qslkonrwc74j2h2kftcidmf6g6id.onion/"
36574
+ ],
36575
+ "refs": [
36576
+ "https://www.ransomlook.io/group/robbing hood"
36577
+ ]
36578
+ },
36579
+ "uuid": "0c442cbf-7466-5847-b1fa-58f9acc24aa2",
36580
+ "value": "robbing hood"
36581
+ },
36582
+ {
36583
+ "description": "",
36584
+ "meta": {
36585
+ "links": [
36586
+ "http://afiocd14efgh5hu8ijkl9012m.onion"
36587
+ ],
36588
+ "refs": [
36589
+ "https://www.ransomlook.io/group/darkhav0c"
36590
+ ]
36591
+ },
36592
+ "uuid": "8141f0e6-4914-54a6-a01e-b4ee77836954",
36593
+ "value": "darkhav0c"
36594
+ },
36595
+ {
36596
+ "description": "",
36597
+ "meta": {
36598
+ "links": [
36599
+ "http://rnsmwareartse3m4hjsumjf222pnka6gad26cqxqmbjvevhbnym5p6ad.onion/",
36600
+ "http://nidzkoszg57upoq7wcalm2xxeh4i6uumh36axsnqnj3i7lep5uhkehyd.onion/",
36601
+ "http://oow7rehrxlzpy6vh3hezl2khstkpa6s7wx3iit74tr6xbjibupld5iad.onion/"
36602
+ ],
36603
+ "refs": [
36604
+ "https://www.ransomlook.io/group/run some wares"
36605
+ ]
36606
+ },
36607
+ "uuid": "f4f89742-15c5-5b77-8669-06c2a1eaacd5",
36608
+ "value": "run some wares"
36609
+ },
36610
+ {
36611
+ "description": "",
36612
+ "meta": {
36613
+ "links": [
36614
+ "http://iywqjjaf2zioehzzauys3sktbcdmuzm2fsjkqsblnm7dt6axjfpoxwid.onion/",
36615
+ "http://xs4psqhvekjle3qwyiav7dzccuo4ylw2eylvd3peuqrld74kzzjzhcyd.onion/"
36616
+ ],
36617
+ "refs": [
36618
+ "https://www.ransomlook.io/group/linkc"
36619
+ ]
36620
+ },
36621
+ "uuid": "39d97d49-fe9d-5af3-95f4-b9f3fdf8e60a",
36622
+ "value": "linkc"
36623
+ },
36624
+ {
36625
+ "meta": {
36626
+ "links": [],
36627
+ "refs": [
36628
+ "https://www.ransomlook.io/group/encrypthub"
36629
+ ]
36630
+ },
36631
+ "uuid": "5d268413-4eee-5d8c-b8b3-63eee4ce4531",
36632
+ "value": "encrypthub"
36633
+ },
36634
+ {
36635
+ "description": "aka Cring / Ghost (Cring)\r<br/>\r<br/>Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.\r<br/>\r<br/>Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.\r<br/>\r<br/>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a",
36636
+ "meta": {
36637
+ "links": [],
36638
+ "refs": [
36639
+ "https://www.ransomlook.io/group/ghost"
36640
+ ]
36641
+ },
36642
+ "uuid": "ef9769e4-067c-5e45-b80f-36f6d5a52a82",
36643
+ "value": "ghost"
36644
+ },
36645
+ {
36646
+ "description": "",
36647
+ "meta": {
36648
+ "links": [
36649
+ "http://oxthiefsvzp3qifmkrpwcllwscyu7jvmdxmd2coz2rxpem6ohut6x5qd.onion/"
36650
+ ],
36651
+ "refs": [
36652
+ "https://www.ransomlook.io/group/ox thief"
36653
+ ]
36654
+ },
36655
+ "uuid": "2a4b653c-f94a-5d41-b33e-b7380d07db66",
36656
+ "value": "ox thief"
36657
+ },
36658
+ {
36659
+ "description": "Mimic v.10 Ransomware-as-a-Service (RaaS). The malware is designed to target various operating systems (Windows, ESXi, NAS, FreeBSD) and features network-wide deployment, file obfuscation, backup destruction, UAC bypass, and multithreaded encryption. The service offers additional tools like NTLM password decryption and call-based extortion. They prohibit attacks on CIS countries and require active participation, with decryption tools available for a fee currently 800USD.",
36660
+ "meta": {
36661
+ "links": [],
36662
+ "refs": [
36663
+ "https://www.ransomlook.io/group/mimic-guram"
36664
+ ]
36665
+ },
36666
+ "uuid": "65cba1a3-f165-5ff6-96c0-fe15981b92eb",
36667
+ "value": "mimic-guram"
36668
+ },
36669
+ {
36670
+ "description": "",
36671
+ "meta": {
36672
+ "links": [
36673
+ "http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/"
36674
+ ],
36675
+ "refs": [
36676
+ "https://www.ransomlook.io/group/anubis"
36677
+ ]
36678
+ },
36679
+ "uuid": "99b9665b-4d05-513e-a01d-7790da1f52ee",
36680
+ "value": "anubis"
36508
36681
}
36509
36682
],
36510
- "version": 145
36683
+ "version": 146
36511
36684
}
0 commit comments