ESXi-Targeting Ransomware: Tactics and Techniques (Part 2)
Common Information
Type Value
UUID de613c54-0e67-4467-b8e9-e009d57e50f7
Fingerprint a704d09b3604a6de
Analysis status DONE
Considered CTI value 2
Text language
Published June 2, 2022, midnight
Added to db Dec. 21, 2022, 4:46 p.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline ESXi-Targeting Ransomware: Tactics and Techniques (Part 2)
Title ESXi-Targeting Ransomware: Tactics and Techniques (Part 2)
Detected Hints/Tags/Attributes 82/1/49
RSS Feed
Attributes
Details Type #Events CTI Value
Details Domain 2
fcker.py
Details Domain 65
blog.cyble.com
Details Domain 4127
github.com
Details Domain 21
blog.group-ib.com
Details Domain 101
www.elastic.co
Details Domain 78
securityaffairs.co
Details Domain 145
threatpost.com
Details Domain 604
www.trendmicro.com
Details Domain 78
socradar.io
Details File 2
fcker.py
Details File 229
advapi32.dll
Details File 52
bcrypt.dll
Details File 1
sosemanuk.cpp
Details File 1
revil-ransomware-linux.html
Details File 3
darkside-linux-vms-targeted.html
Details File 3
new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
Details File 1
analysis-and-impact-of-lockbit-ransomwares-first-linux-and-vmware-esxi-variant.html
Details Github username 2
hildaboo
Details Github username 1
maxamin
Details sha1 1
91ad089f5259845141dfb10145271553aa711a2b
Details sha256 1
0cd7b6ea8857ce827180342a1c955e79c3336a6cf2000244e5cfd4279c5fc1b6
Details sha256 3
3a08e3bfec2db5dbece359ac9662e65361a8625a0122e68b56cd5ef3aedf8ce1
Details sha256 1
039e1765de1cdec65ad5e49266ab794f8e5642adb0bdeb78d8c0b77e8b34ae09
Details sha256 2
95776f31cbcac08eb3f3e9235d07513a6d7a6bf9f1b7f3d400b2cf0afdb088a7
Details sha256 1
dc90560d7198bf824b65ba2cfbe403d84d38113f41a1aa2f37f8d827fd9e0ceb
Details sha256 3
6a0449a0b92dc1b17da219492487de824e86a25284f21e6e3af056fe3f4c4ec0
Details sha256 1
2e52494e776be6433c89d5853f02b536f7da56e94bbe86ae4cc782f85bed2c4b
Details sha256 1
1cbbf108f44c8f4babde546d26425ca5340dccf878d306b90eb0fbec2f83ab51
Details sha256 2
ea1872b2835128e3cb49a0bc27e4727ca33c4e6eba1e80422db19b505f965bc4
Details sha256 2
8f3db63f70fad912a3d5994e80ad9a6d1db6c38d119b38bc04890dfba4c4a2b2
Details sha256 4
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef
Details sha256 4
984ce69083f2865ce90b48569291982e786980aeef83345953276adfcbbeece8
Details sha256 3
cb408d45762a628872fa782109e8fcfc3a5bf456074b007de21e9331bb3c5849
Details sha256 1
7594bf1d87d35b489545e283ef1785bb2e04637cc1ff1aca9b666dde70528e2b
Details sha256 2
f3a1576837ed56bcf79ff486aadf36e78d624853e9409ec1823a6f46fd0143ea
Details Url 1
https://blog.cyble.com/2021/07/05/deep-dive-into-builder-of-notorious-babuk-ransomware
Details Url 2
https://github.com/hildaboo/babukransomwaresourcecode
Details Url 1
https://blog.cyble.com/2022/01/17/avoslocker-ransomware-linux-version-targets-vmware-esxi-servers
Details Url 1
https://blog.group-ib.com/hive
Details Url 1
https://news.sophos.com/en-us/2021/10/05/python-ransomware-script-targets-esxi-server-for-encryption
Details Url 1
https://www.elastic.co/security-labs/luna-ransomware-attack-pattern
Details Url 1
https://securityaffairs.co/wordpress/119497/cyber-crime/revil-ransomware-linux.html
Details Url 1
https://threatpost.com/linux-variant-of-hellokitty-ransomware-targets-vmware-esxi-servers/167883
Details Url 3
https://www.trendmicro.com/en_us/research/21/e/darkside-linux-vms-targeted.html
Details Url 1
https://blog.reversinglabs.com/blog/gwisinlocker-ransomware-targets-south-korean-industrial-and-pharmaceutical-companies
Details Url 1
https://www.trendmicro.com/en_us/research/22/e/new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
Details Url 1
https://socradar.io/redalert-ransomware-targets-windows-and-linux-mware-esxi-servers
Details Url 1
https://www.trendmicro.com/en_us/research/22/a/analysis-and-impact-of-lockbit-ransomwares-first-linux-and-vmware-esxi-variant.html
Details Url 1
https://github.com/maxamin/conti_locker