Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Ragnar Locker

Ragnar Locker

Ragnar Locker is a ransomware that has been in use since at least December 2019.[1][2]

ID: S0481
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 29 June 2020
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Ragnar Locker has used cmd.exe and batch scripts to execute commands.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Ragnar Locker has used sc.exe to create a new service for the VirtualBox driver.[1]

EnterpriseT1486Data Encrypted for Impact

Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom.[1][2]

EnterpriseT1564.006Hide Artifacts:Run Virtual Instance

Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enablesRagnar Locker to encrypt files on the host operating system, including files on any mapped drives.[1]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

Ragnar Locker has attempted to terminate/stop processes and services associated with endpoint security products.[1]

EnterpriseT1490Inhibit System Recovery

Ragnar Locker can delete volume shadow copies usingvssadmin delete shadows /all /quiet.[1]

EnterpriseT1120Peripheral Device Discovery

Ragnar Locker may attempt to connect to removable drives and mapped network drives.[1]

EnterpriseT1489Service Stop

Ragnar Locker has attempted to stop services associated with business applications and databases to release the lock on files used by these applications so they may be encrypted.[1]

EnterpriseT1218.007System Binary Proxy Execution:Msiexec

Ragnar Locker has been delivered as an unsigned MSI package that was executed withmsiexec.exe.[1]

.010System Binary Proxy Execution:Regsvr32

Ragnar Locker has used regsvr32.exe to execute components of VirtualBox.[1]

.011System Binary Proxy Execution:Rundll32

Ragnar Locker has used rundll32.exe to execute components of VirtualBox.[1]

EnterpriseT1614System Location Discovery

Before executing malicious code,Ragnar Locker checks the Windows APIGetLocaleInfoW and doesn't encrypt files if it finds a former Soviet country.[3]

EnterpriseT1569.002System Services:Service Execution

Ragnar Locker has used sc.exe to execute a service that it creates.[1]

Groups That Use This Software

IDNameReferences
G0061FIN8

[4]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp