Skip to content

Commit bfb4174

Browse files
committed
chg: [ransomware] updated to the latest version
1 parent e05bb5c commit bfb4174

File tree

1 file changed

+190
-17
lines changed

1 file changed

+190
-17
lines changed

clusters/ransomware.json

+190-17
Original file line numberDiff line numberDiff line change
@@ -9397,6 +9397,10 @@
93979397
"description": "Ransomware encrypts disk partitions PDFBewerbungsmappe.exe",
93989398
"meta": {
93999399
"encryption": "Modified Salsa20",
9400+
"links": [
9401+
"http://petya37h5tbhyvki.onion",
9402+
"http://petya5koahtsf7sv.onion"
9403+
],
94009404
"payment-method": "Bitcoin - Website (onion)",
94019405
"ransomnotes-filenames": [
94029406
"YOUR_FILES_ARE_ENCRYPTED.TXT"
@@ -9405,7 +9409,8 @@
94059409
"http://www.thewindowsclub.com/petya-ransomware-decrypt-tool-password-generator",
94069410
"https://www.youtube.com/watch?v=mSqxFjZq_z4",
94079411
"https://blog.malwarebytes.org/threat-analysis/2016/04/petya-ransomware/",
9408-
"https://www.bleepingcomputer.com/news/security/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme/"
9412+
"https://www.bleepingcomputer.com/news/security/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme/",
9413+
"https://www.ransomlook.io/group/petya"
94099414
],
94109415
"synonyms": [
94119416
"Goldeneye"
@@ -11001,6 +11006,9 @@
1100111006
".xort",
1100211007
".trun"
1100311008
],
11009+
"links": [
11010+
"http://restoredz4xpmuqr.onion"
11011+
],
1100411012
"payment-method": "Bitcoin",
1100511013
"price": "0.438",
1100611014
"ransomnotes-filenames": [
@@ -11010,7 +11018,8 @@
1101011018
"<random>.hta | VAULT.hta"
1101111019
],
1101211020
"refs": [
11013-
"http://www.nyxbone.com/malware/russianRansom.html"
11021+
"http://www.nyxbone.com/malware/russianRansom.html",
11022+
"https://www.ransomlook.io/group/vaultcrypt"
1101411023
],
1101511024
"synonyms": [
1101611025
"CrypVault",
@@ -14744,7 +14753,8 @@
1474414753
"http://npkoxkuygikbkpuf5yxte66um727wmdo2jtpg2djhb2e224i4r25v7ad.onion",
1474514754
"http://6v4q5w7di74grj2vtmikzgx2tnq5eagyg2cubpcnqrvvee2ijpmprzqd.onion/remote0/",
1474614755
"http://l4rdimrqyonulqjttebry4t6wuzgjv5m62rnpjho3q22a6maf6d5evyd.onion/",
14747-
"http://frgp3f3u2ddafv4ny7tqn6tc674m6fyymyywoaxot7xskbjmiyhhsyqd.onion/"
14756+
"http://frgp3f3u2ddafv4ny7tqn6tc674m6fyymyywoaxot7xskbjmiyhhsyqd.onion/",
14757+
"http://htmxyptur5wfjrd7uvg23snupub2pbtlfelk45n37b3augl2w4eearid.onion/remote0/"
1474814758
],
1474914759
"ransomnotes-filenames": [
1475014760
"ClopReadMe.txt",
@@ -25422,6 +25432,12 @@
2542225432
},
2542325433
{
2542425434
"description": "ransomware",
25435+
"meta": {
25436+
"links": [],
25437+
"refs": [
25438+
"https://www.ransomlook.io/group/zeppelin"
25439+
]
25440+
},
2542525441
"uuid": "bc62429c-1bf7-42c0-997d-d8c2f80355de",
2542625442
"value": "Zeppelin"
2542725443
},
@@ -27681,7 +27697,9 @@
2768127697
"http://databasebb3.top/",
2768227698
"http://l6zxfn3u2s4bl4vt3nvpve6uibqn3he3tgwdpkeeplhwlfwy3ifbt5id.onion/",
2768327699
"http://onlylegalstuff6.top/",
27684-
"https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/"
27700+
"https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/",
27701+
"http://bpeln2aqs66qqfuex2cvcyjiy5ggcwbyh5nbmxzxt6daamkmpmufv4qd.onion/",
27702+
"http://ond5arqab77n6tykvi4aqp7oqegqdfgqfyf7fzyhfyhmbp7iafpzdtad.onion/"
2768527703
],
2768627704
"ransomnotes": [
2768727705
"Your data are stolen and encrypted\nThe data will be published on TOR website if you do not pay the ransom\nYou can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) https://aazsbsgya565y1u2c6Lay6yfiebkcbtvvcytyolt33s77xypi7nypxyd.onion/ \n\nYour company id for log in: [REDACTED]"
@@ -29609,7 +29627,8 @@
2960929627
"http://myosbja7hixkkjqihsjh6yvmqplz62gr3r4isctjjtu2vm5jg6hsv2ad.onion/chat",
2961029628
"http://qkbbaxiuqqcqb5nox4np4qjcniy2q6m7yeluvj7n5i5dn7pgpcwxwfid.onion",
2961129629
"http://monti5o7lvyrpyk26lqofnfvajtyqruwatlfaazgm3zskt3xiktudwid.onion",
29612-
"http://il6jcce6f5htppc3smu4olpt5pz3akdg5h7k7tb4n45jixxu2o2oxlid.onion/"
29630+
"http://il6jcce6f5htppc3smu4olpt5pz3akdg5h7k7tb4n45jixxu2o2oxlid.onion/",
29631+
"http://cls2wzky5vxgu54fg4fqdj4q4olyvmwt6rinmtgqsq5d3vubv7bdzgqd.onion/"
2961329632
],
2961429633
"refs": [
2961529634
"https://www.ransomlook.io/group/monti"
@@ -29863,7 +29882,9 @@
2986329882
"ftp://dataShare:[email protected]",
2986429883
"https://31.41.244.100/",
2986529884
"http://ijzn3sicrcy7quixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvad.onion",
29866-
"http://kbsqoiyihadmwczmxkbovk7ss2dcynitwhhfu5yw725dbogo5kthfaad.onion"
29885+
"http://kbsqoiyihadmwczmxkbovk7ss2dcynitwhhfu5yw725dbogo5kthfaad.onion",
29886+
"http://ftp://dataShare:[email protected]",
29887+
"http://ftp://dataShare:[email protected]"
2986729888
],
2986829889
"refs": [
2986929890
"https://www.ransomlook.io/group/qilin"
@@ -30040,7 +30061,8 @@
3004030061
"http://zv7u2tclxajbgae6ba4jkisnkfkts3lk7lxlypmuqktrk42qmo2c7hqd.onion/",
3004130062
"http://secxrosqawaefsio3biv2dmi2c5yunf3t7ilwf54czq3v4bi7w6mbfad.onion/",
3004230063
"http://cqwdv5rxut5l3blbeg74ddfo6ya65xsxqan7vawffdng6ynd2kulfkqd.onion/",
30043-
"http://nlqnxzqixcwazwyib4bft2m6ikjrtihh4qgdtnmpmbi3meio5jj2xsad.onion/"
30064+
"http://nlqnxzqixcwazwyib4bft2m6ikjrtihh4qgdtnmpmbi3meio5jj2xsad.onion/",
30065+
"http://naurcsrhvsnxotv5awcsmddlcwgv447fvolmkyo6gfgszvtofijd6oid.onion/"
3004430066
],
3004530067
"refs": [
3004630068
"https://www.ransomlook.io/group/ransomhouse"
@@ -31191,7 +31213,8 @@
3119131213
"http://d2wqt4kek62s35hjeankc75nis4zn4e5i6zdtmfkyeevr7fygpf2iiid.onion",
3119231214
"http://sclj2rax5ljisew3v4msecylzo7iieqw25kcl7io4szei4qcujxixaid.onion",
3119331215
"http://xyy2fymbdytltylyuicasuvw7vw3gtgm3cvvjskh4jnzfg3gp7dqgnqd.onion",
31194-
"http://heac3upmfv33scnkeek64dqdx2cblv7z256aezluyvgtwsxi2o3coiid.onion/"
31216+
"http://heac3upmfv33scnkeek64dqdx2cblv7z256aezluyvgtwsxi2o3coiid.onion/",
31217+
"http://uss2a5zyeth7sop57zhgqcyafmnbkmoknps3i7anusze77zppp4bf5yd.onion/"
3119531218
],
3119631219
"refs": [
3119731220
"https://www.ransomlook.io/group/cloak"
@@ -32072,6 +32095,7 @@
3207232095
"value": "c3rb3r"
3207332096
},
3207432097
{
32098+
"description": "",
3207532099
"meta": {
3207632100
"links": [
3207732101
"http://6n5tfadusp4sarzuxntz34q4ohspiaya2mc6aw6uhlusfqfsdomavyyd.onion",
@@ -32170,7 +32194,8 @@
3217032194
"http://medusakxxtp3uo7vusntvubnytaph4d3amxivbggl3hnhpk2nmus34yd.onion",
3217132195
"http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion",
3217232196
"http://medusakxxtp3uo7vusntvubnytaph4d3amxivbgg13hnhpk2nmus34yd.onion/227098164ef1fdb119ef537986bbdf24",
32173-
"http://hm2hlugduzuxiya5bgrsewfxmrzxbmslvg3t42zdzsorcn2nyfbrh6qd.onion/"
32197+
"http://hm2hlugduzuxiya5bgrsewfxmrzxbmslvg3t42zdzsorcn2nyfbrh6qd.onion/",
32198+
"http://7aqabivkwmpvjkyefonf3gpy5gsubopqni7kcirsrq3pflckxq5zz4id.onion/"
3217432199
],
3217532200
"ransomnotes-filenames": [
3217632201
"!!!READ_ME_MEDUSA!!!.txt"
@@ -32757,7 +32782,28 @@
3275732782
"http://brclvwefzszko5xrlan7pebyliqdkv5cw75xksrxp772urjytkko5fyd.onion",
3275832783
"http://rmr2kgq6vzifnyoaz7jaxdx5t6gsxurbakah5bafatsqldtt2mwneyid.onion",
3275932784
"http://xdg53hbpwshgtbfbm6m7nv3ckkduo3dfdwdearcsvybfb3qaf4v7suyd.onion",
32760-
"http://toq7bk6abkr6lapwj3k22ffu4ud5jpox7jbfgzetpz7lxb427katstid.onion"
32785+
"http://toq7bk6abkr6lapwj3k22ffu4ud5jpox7jbfgzetpz7lxb427katstid.onion",
32786+
"http://tjnt7x2xodhthwrfnabhloogoo66jrgohgzpta22uwbqznsvrm5tu4id.onion/",
32787+
"http://fvixrjsdk2adazfnz4mrdvr4eznm346fk33y7nos65bdrtmfvw7f5vid.onion/",
32788+
"http://vhxbjx4iaeqgna22kqt5ajlqi72vbm6qcjev3efgr5oiklgptvjvjhqd.onion/",
32789+
"http://yszafmehxkoa7hrcay7cnyogfrmjqc4grds6innadspii5oz6fneyzyd.onion/",
32790+
"http://i4xita2momkw2jitqohbqgomjxqp53pyvgv5gbogvendbx3ucnynekyd.onion/",
32791+
"http://3ysbtsnhldlijvfdv7hwkr2gl3op2d56puspeo4whs6p272sde6fq5id.onion/",
32792+
"http://bd3atkmicmcif6mliquqdxltjq6mxvagw44gealayp34awtcx3ywlxid.onion/",
32793+
"http://biurt7anlhkncf2t3dvvtlszpnnyg3oiksyapcikxostz6zfrh4csvid.onion/",
32794+
"http://bzfp6qfir7bfqjxnpgofwvfzoyca7kmcsfliot5zzfsas6oofwo7zoad.onion/",
32795+
"http://fmcrlb2t524cpiiqiudbvdjmgvaczix2o5y5uc3zvi57niiyl467qgyd.onion/",
32796+
"http://gsqxzyynjegp73imth5p3ug4etgbehd3pb72e4zmiro4st3s2nlkmgyd.onion/",
32797+
"http://hjs27fuzq4j4gzshhbakt274eewxv2qdwmeugjx5eepwoaecczdkiiyd.onion/",
32798+
"http://i2agsvbyoy3viwel7ucjqtzcq3ocsj3jqqew5wlwpxty6uxd455qkoqd.onion/",
32799+
"http://kfvsqtlnfa5iiweywpubtqk4c2omc2vu4hvy26mhanaahtvpifzuxlid.onion/",
32800+
"http://l5hzzorh57w4wp5va4ouye77x5f2apqd6rvvh3tb2a7vcenn6c5a2fad.onion/",
32801+
"http://ljxmkfr6kl3ovwgkxycdrvvdf6tk7qdhgowcjkpsiocg7j5uuhmszyyd.onion/",
32802+
"http://red46f427ed4ogc76gscsqrytpdh4gy5reh2g6dzjpbm24k3ns2t27qd.onion/",
32803+
"http://xznhtihjpaz3rwcgwqrv3jipbbivlg5ttsdqoet55xe5a3nbxi47jwqd.onion/",
32804+
"http://y2hkrrb7aba2pgyvpfzqj3vlhbw7e2wj2t2wvtlmkr54yqz7p5ghnfid.onion/",
32805+
"http://yvst24dvz66unqqes6se3p3flxyzbtohaz6faknu5ne3zzeq2jumpiid.onion",
32806+
"http://sres5y2sze7lqkk5s4ahns5lhvc7nr5hqy5lchbxcvhaty2hnivdacqd.onion"
3276132807
],
3276232808
"refs": [
3276332809
"https://www.ransomlook.io/group/ransomhub"
@@ -33728,7 +33774,9 @@
3372833774
"http://4q5tsu5o3msmv4am4dfhupwhzlyg7wv3lpswbvbhcrknr4ega7xetxad.onion/",
3372933775
"http://z2b75lk7xf6kme3zfvlmdmpwiaansnkcuhsojd23dgub5md24fhogcyd.onion/",
3373033776
"http://7lxwbzlkpjyuahuvngwwkc4mycj2a4flh45ksqjo2ezfdbkmxmlxikad.onion/",
33731-
"http://7watkqnnuwxvlpgy5gaosgqy67nve3jgpy37xobqngmswz3vuvde56yd.onion/"
33777+
"http://7watkqnnuwxvlpgy5gaosgqy67nve3jgpy37xobqngmswz3vuvde56yd.onion/",
33778+
"http://5dw7bszmidrhpoltqbqmpixpz6mvgez3mr6xc7ktval2glrmbxkwopad.onion/",
33779+
"http://a3kvb22nuhfgaluy6uzufrjn3azzsu7tylszdbyne3kiextdmxz4nnyd.onion"
3373233780
],
3373333781
"refs": [
3373433782
"https://www.ransomlook.io/group/embargo"
@@ -33903,7 +33951,10 @@
3390333951
"http://mybmtbgd7aprdnw2ekxht5qap5daam2wch25coqerrq2zdioanob34ad.onion/",
3390433952
"http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/",
3390533953
"http://cuuhrxbg52c5agytmtjpwfu7mrs4xtaitc4mukkiy2kqdxeqbcmuhaid.onion/",
33906-
"http://p6wmotxzvg34tdmpwm4beqgrcyp5iys43snkccsahnw74la3k3xx6pad.onion"
33954+
"http://p6wmotxzvg34tdmpwm4beqgrcyp5iys43snkccsahnw74la3k3xx6pad.onion",
33955+
"http://brain4zoadgr6clxecixffvxjsw43cflyprnpfeak72nfh664kqqriyd.onion/",
33956+
"http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/c/lgc2Yxua65agt4XMOMkQKJjsdrV2IzYk",
33957+
"http://4ldgw2wuidqu5ef3rzx4byonf3y7rdnh43jiw2z4sbtjiwic6gkov7yd.onion/"
3390733958
],
3390833959
"ransomnotes-filenames": [
3390933960
"added_extension.README.txt",
@@ -34318,6 +34369,7 @@
3431834369
"value": "orca"
3431934370
},
3432034371
{
34372+
"description": "",
3432134373
"meta": {
3432234374
"links": [
3432334375
"http://hackerosyolorz77y7vwj57zobwdeuzydhctz3kuuzr52ylzayvxuqyd.onion"
@@ -34363,7 +34415,8 @@
3436334415
"http://bf7dw4n6zne6rbgjlpcsidphpk753nkyubipkym5t4pntgfyb6clw2qd.onion/login",
3436434416
"http://nxarphaf35qp2uuosaq54m3a2s5kt4svpcv56mvz6r7xy6na7uo5ypyd.onion/",
3436534417
"http://bxi2cepk57dy3uhgwqd6dri6jtuqe7btay225rn6xkvvgnp2cvjvowqd.onion/",
34366-
"http://2idvzxbwvzbxhuniw7kfaimcvtqazmn7nmuw7codg65cshwwsvnpz7id.onion/"
34418+
"http://2idvzxbwvzbxhuniw7kfaimcvtqazmn7nmuw7codg65cshwwsvnpz7id.onion/",
34419+
"http://xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion"
3436734420
],
3436834421
"refs": [
3436934422
"https://www.ransomlook.io/group/nitrogen"
@@ -34473,7 +34526,9 @@
3447334526
"http://zmdmlidqqrxbkyqkqttbsbticjbofjs5uzwecqvdxfadvsjw7mp5kjyd.onion",
3447434527
"http://tyrvuuh5tvrvk4x6lfxrvgabqmzpnxehelmdqztu3vekujcknvl2ufad.onion/",
3447534528
"http://k5pmfzuqwxr2uhnskktjicbnzr633zejupe54yginljj3mgoysfwe4id.onion/",
34476-
"http://65bhkrfbqnfjgcsr7456luzjauw5nikuwxradlysivy5wbttjikdhxid.onion/"
34529+
"http://65bhkrfbqnfjgcsr7456luzjauw5nikuwxradlysivy5wbttjikdhxid.onion/",
34530+
"http://k6oor2g5bfvdxhxr2g6fczu3iqldbzyavydk56lh6z7ex7n7wqg4eryd.onion/",
34531+
"http://tpwgxrocjvlonhrfjm4jx3dore2u4brxfj4ikt7iba36c23svthhf7ad.onion/"
3447734532
],
3447834533
"refs": [
3447934534
"https://www.ransomlook.io/group/interlock"
@@ -34502,7 +34557,8 @@
3450234557
"http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion",
3450334558
"http://r7i4vprxr2vznmhnnxj36264ofwx6extopdz535f5v357nqacifymbad.onion/",
3450434559
"http://hellcat.rw",
34505-
"http://hcatxn4ppkgmakaatrq6bsbhqk5ouhviygyx57gljjt5iseul5nvpayd.onion"
34560+
"http://hcatxn4ppkgmakaatrq6bsbhqk5ouhviygyx57gljjt5iseul5nvpayd.onion",
34561+
"http://hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion/api2.php?action=victims"
3450634562
],
3450734563
"refs": [
3450834564
"https://www.ransomlook.io/group/hellcat"
@@ -35691,7 +35747,10 @@
3569135747
"description": "Kraken leak blog (hellokitty)",
3569235748
"meta": {
3569335749
"links": [
35694-
"http://krakenccj3wr23452a4ibkbkuph4d6soyx2xgjoogtuamc3m7u7wemad.onion/"
35750+
"http://krakenccj3wr23452a4ibkbkuph4d6soyx2xgjoogtuamc3m7u7wemad.onion/",
35751+
"http://zq3k4odlfpbzc5y4sxqgolivelxepceaakru3xqo4ll2czmvvtek2ryd.onion/",
35752+
"http://t3uouzfvsaqurb2rzoe2mkpetp54d7lgtl45ply34v5lugsnzysmkhid.onion/",
35753+
"http://xbupelqsy7lubogl6kdtdqguxoleehbxnuuqm2dos6bbmdwablpqckad.onion/"
3569535754
],
3569635755
"refs": [
3569735756
"https://www.ransomlook.io/group/kraken"
@@ -36482,6 +36541,7 @@
3648236541
"value": "late.lol"
3648336542
},
3648436543
{
36544+
"description": "",
3648536545
"meta": {
3648636546
"links": [
3648736547
"http://fdevb3qh24ak7wujqsf7co4z6fstm5qxvnkkgs62fayztjfjjtqqgsad.onion/"
@@ -36505,7 +36565,120 @@
3650536565
},
3650636566
"uuid": "a88c7ffe-a9e1-5961-bbfa-22725789fd86",
3650736567
"value": "tooda"
36568+
},
36569+
{
36570+
"description": "",
36571+
"meta": {
36572+
"links": [
36573+
"http://fonektibq4fbgergrorw43yawhz3qslkonrwc74j2h2kftcidmf6g6id.onion/"
36574+
],
36575+
"refs": [
36576+
"https://www.ransomlook.io/group/robbing hood"
36577+
]
36578+
},
36579+
"uuid": "0c442cbf-7466-5847-b1fa-58f9acc24aa2",
36580+
"value": "robbing hood"
36581+
},
36582+
{
36583+
"description": "",
36584+
"meta": {
36585+
"links": [
36586+
"http://afiocd14efgh5hu8ijkl9012m.onion"
36587+
],
36588+
"refs": [
36589+
"https://www.ransomlook.io/group/darkhav0c"
36590+
]
36591+
},
36592+
"uuid": "8141f0e6-4914-54a6-a01e-b4ee77836954",
36593+
"value": "darkhav0c"
36594+
},
36595+
{
36596+
"description": "",
36597+
"meta": {
36598+
"links": [
36599+
"http://rnsmwareartse3m4hjsumjf222pnka6gad26cqxqmbjvevhbnym5p6ad.onion/",
36600+
"http://nidzkoszg57upoq7wcalm2xxeh4i6uumh36axsnqnj3i7lep5uhkehyd.onion/",
36601+
"http://oow7rehrxlzpy6vh3hezl2khstkpa6s7wx3iit74tr6xbjibupld5iad.onion/"
36602+
],
36603+
"refs": [
36604+
"https://www.ransomlook.io/group/run some wares"
36605+
]
36606+
},
36607+
"uuid": "f4f89742-15c5-5b77-8669-06c2a1eaacd5",
36608+
"value": "run some wares"
36609+
},
36610+
{
36611+
"description": "",
36612+
"meta": {
36613+
"links": [
36614+
"http://iywqjjaf2zioehzzauys3sktbcdmuzm2fsjkqsblnm7dt6axjfpoxwid.onion/",
36615+
"http://xs4psqhvekjle3qwyiav7dzccuo4ylw2eylvd3peuqrld74kzzjzhcyd.onion/"
36616+
],
36617+
"refs": [
36618+
"https://www.ransomlook.io/group/linkc"
36619+
]
36620+
},
36621+
"uuid": "39d97d49-fe9d-5af3-95f4-b9f3fdf8e60a",
36622+
"value": "linkc"
36623+
},
36624+
{
36625+
"meta": {
36626+
"links": [],
36627+
"refs": [
36628+
"https://www.ransomlook.io/group/encrypthub"
36629+
]
36630+
},
36631+
"uuid": "5d268413-4eee-5d8c-b8b3-63eee4ce4531",
36632+
"value": "encrypthub"
36633+
},
36634+
{
36635+
"description": "aka Cring / Ghost (Cring)\r<br/>\r<br/>Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.\r<br/>\r<br/>Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.\r<br/>\r<br/>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a",
36636+
"meta": {
36637+
"links": [],
36638+
"refs": [
36639+
"https://www.ransomlook.io/group/ghost"
36640+
]
36641+
},
36642+
"uuid": "ef9769e4-067c-5e45-b80f-36f6d5a52a82",
36643+
"value": "ghost"
36644+
},
36645+
{
36646+
"description": "",
36647+
"meta": {
36648+
"links": [
36649+
"http://oxthiefsvzp3qifmkrpwcllwscyu7jvmdxmd2coz2rxpem6ohut6x5qd.onion/"
36650+
],
36651+
"refs": [
36652+
"https://www.ransomlook.io/group/ox thief"
36653+
]
36654+
},
36655+
"uuid": "2a4b653c-f94a-5d41-b33e-b7380d07db66",
36656+
"value": "ox thief"
36657+
},
36658+
{
36659+
"description": "Mimic v.10 Ransomware-as-a-Service (RaaS). The malware is designed to target various operating systems (Windows, ESXi, NAS, FreeBSD) and features network-wide deployment, file obfuscation, backup destruction, UAC bypass, and multithreaded encryption. The service offers additional tools like NTLM password decryption and call-based extortion. They prohibit attacks on CIS countries and require active participation, with decryption tools available for a fee currently 800USD.",
36660+
"meta": {
36661+
"links": [],
36662+
"refs": [
36663+
"https://www.ransomlook.io/group/mimic-guram"
36664+
]
36665+
},
36666+
"uuid": "65cba1a3-f165-5ff6-96c0-fe15981b92eb",
36667+
"value": "mimic-guram"
36668+
},
36669+
{
36670+
"description": "",
36671+
"meta": {
36672+
"links": [
36673+
"http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/"
36674+
],
36675+
"refs": [
36676+
"https://www.ransomlook.io/group/anubis"
36677+
]
36678+
},
36679+
"uuid": "99b9665b-4d05-513e-a01d-7790da1f52ee",
36680+
"value": "anubis"
3650836681
}
3650936682
],
36510-
"version": 145
36683+
"version": 146
3651136684
}

0 commit comments

Comments
 (0)