Ragnar Locker is a ransomware that has been in use since at least December 2019.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .003 | Command and Scripting Interpreter:Windows Command Shell | Ragnar Locker has used cmd.exe and batch scripts to execute commands.[1] |
| Enterprise | T1543 | .003 | Create or Modify System Process:Windows Service | Ragnar Locker has used sc.exe to create a new service for the VirtualBox driver.[1] |
| Enterprise | T1486 | Data Encrypted for Impact | Ragnar Locker encrypts files on the local machine and mapped drives prior to displaying a note demanding a ransom.[1][2] | |
| Enterprise | T1564 | .006 | Hide Artifacts:Run Virtual Instance | Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enablesRagnar Locker to encrypt files on the host operating system, including files on any mapped drives.[1] |
| Enterprise | T1562 | .001 | Impair Defenses:Disable or Modify Tools | Ragnar Locker has attempted to terminate/stop processes and services associated with endpoint security products.[1] |
| Enterprise | T1490 | Inhibit System Recovery | Ragnar Locker can delete volume shadow copies using | |
| Enterprise | T1120 | Peripheral Device Discovery | Ragnar Locker may attempt to connect to removable drives and mapped network drives.[1] | |
| Enterprise | T1489 | Service Stop | Ragnar Locker has attempted to stop services associated with business applications and databases to release the lock on files used by these applications so they may be encrypted.[1] | |
| Enterprise | T1218 | .007 | System Binary Proxy Execution:Msiexec | Ragnar Locker has been delivered as an unsigned MSI package that was executed with |
| .010 | System Binary Proxy Execution:Regsvr32 | Ragnar Locker has used regsvr32.exe to execute components of VirtualBox.[1] | ||
| .011 | System Binary Proxy Execution:Rundll32 | Ragnar Locker has used rundll32.exe to execute components of VirtualBox.[1] | ||
| Enterprise | T1614 | System Location Discovery | Before executing malicious code,Ragnar Locker checks the Windows API | |
| Enterprise | T1569 | .002 | System Services:Service Execution | Ragnar Locker has used sc.exe to execute a service that it creates.[1] |