ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool RagnarLocker

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: RagnarLocker

NamesRagnarLocker
Ragnar Locker
CategoryMalware
TypeRansomware, Big Game Hunting
Description(McAfee) The RagnarLocker ransomware first appeared in the wild at the end of December 2019 as part of a campaign against compromised networks targeted by its operators.
The ransomware code is small (only 48kb after the protection in its custom packer is removed) and coded in a high programming language (C/C++). Like all ransomware, the goal of this malware is to encrypt all files that it can and request a ransom for decrypting them.
RagnarLocker’s operators, as we have seen with other bad actors recently, threaten to publish the information they get from compromised machines if ransoms are not paid.
After conducting reconnaissance, the ransomware operators enter the victim’s network and, in some pre-deployment stages, steal information before finally dropping the ransomware that will encrypt all files in the victim’s machines.
The most notable RagnarLocker attack to date saw this malware deployed in a large company where the malware operators then requested a ransom of close to $11 million USD in return for not leaking information stolen from the company. In this report we will talk about the sample used in this attack.
Information<https://www.mcafee.com/blogs/other-blogs/mcafee-labs/ragnarlocker-ransomware-threatens-to-release-confidential-information/>
<https://zawadidone.nl/2020/06/01/lets-analyze-ragnar-locker.html>
<https://www.deepinstinct.com/2020/04/27/ragnar-locker-ransomware-unlocked-by-deep-instinct/>
<https://resources.infosecinstitute.com/topic/ragnar-locker-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/>
<https://securelist.com/targeted-ransomware-encrypting-data/99255/>
<https://www.bankinfosecurity.com/fbi-warns-uptick-in-ragnar-locker-ransomware-activity-a-15454>
<https://www.bleepingcomputer.com/news/security/fbi-ransomware-gang-breached-52-us-critical-infrastructure-orgs/>
<https://www.tripwire.com/state-of-security/security-data-protection/ragnar-locker-ransomware-what-you-need-to-know/>
<https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector>
MITRE ATT&CK<https://attack.mitre.org/software/S0481/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.ragnarlocker>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:ragnarlocker>

Last change to this tool card: 30 December 2022

Download this tool card in JSON format

Previous: RADIOSTAR
Next: Ragnatela

All groups using tool RagnarLocker

ChangedNameCountryObserved

APT groups

 FIN8[Unknown]2016-Dec 2022 
 UNC2447[Unknown]2020 
 Viking Spider[Unknown]2019-Oct 2023X

3 groups listed (3 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]