Inactive ransomware operator
← All groupsNetwalker
26 victims indexed · first seen 6 years ago · last activity 5 years ago
At a glance
- Status
- inactive
- First seen
- 6 years ago
- Last activity
- 5 years ago
- Onion sites
- 1 known endpoint
- Primary sector
- Healthcare and Public Health · 5 hits
About
References
65 linksExternal sources curated by the MISP threat-intel community.
- threatpost.com/netwalker-ransomware-suspect-charged/163405
- cybereason.com/blog/cybereason-vs.-netwalker-ransomware
- ncsc.org/trends/monthly-trends-articles/2020/netwalker-ransomware
- 0x00-0x7f.github.io/Netwalker-from-Powershell-reflective-loader-to-injected-Dll/
- blog.talosintelligence.com/2020/09/CTIR-quarterly-trends-Q4-2020.html
- blog.trendmicro.com/trendlabs-security-intelligence/netwalker-fileless-ransomware-injected-via-reflective-loading/
- blogs.blackberry.com/en/2021/03/zerologon-to-ransomware
- cert-agid.gov.it/news/netwalker-il-ransomware-che-ha-beffato-lintera-community/
- cti-league.com/wp-content/uploads/2021/02/CTI-League-Darknet-Report-2021.pdf
- danusminimus.github.io/Zero2Auto-Netwalker-Walkthrough/
- docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3
- download.microsoft.com/download/f/8/1/f816b8b6-bee3-41e5-b6cc-e925a5688f61/Microsoft_Digital_Defense_Report_2020_September.pdf
- go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
- go.crowdstrike.com/rs/281-OBQ-266/images/ReportCSIT-20081e.pdf
- ics-cert.kaspersky.com/media/KASPERSKY_H1_2020_ICS_REPORT_EN.pdf
- id-ransomware.blogspot.com/2019/09/koko-ransomware.html
- ke-la.com/how-ransomware-gangs-find-new-monetization-schemes-and-evolve-in-marketing/
- ke-la.com/to-attack-or-not-to-attack-targeting-the-healthcare-sector-in-the-underground-ecosystem/
- krebsonsecurity.com/2021/01/arrest-seizures-tied-to-netwalker-ransomware
- lopqto.me/posts/automated-dynamic-import-resolving
Timeline
10 monthsTop countries
Top sectors
MITRE ATT&CK
12 techniques · 8 tacticsTactics
Techniques
- T1566.001Spearphishing Attachment
- T1190Exploit Public-Facing Application
- T1059.001PowerShell
- T1059.003Windows Command Shell
- T1562.001Disable or Modify Tools
- T1055Process Injection
- T1083File and Directory Discovery
- T1018Remote System Discovery
- T1021.001Remote Desktop Protocol
- T1560.001Archive via Utility
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
Detection · YARA rules
6 rulesnetwalker_ransomware
YARA rule from ATR/Trellix: ransomware/RANSOM_netwalker.yar
source: ATR/Trellix
doesn
YARA rule from ATR/Trellix: ransomware/RANSOM_netwalker.yar
source: ATR/Trellix
netwalker_signed
YARA rule from ATR/Trellix: ransomware/RANSOM_netwalker.yar
source: ATR/Trellix
will
YARA rule from ATR/Trellix: ransomware/RANSOM_netwalker.yar
source: ATR/Trellix
Netwalker
YARA rule from ATR/Trellix: ransomware/RANSOM_netwalker.yar
source: ATR/Trellix
win_netwalker_reflective_dll_injection_decoded
YARA rule from ATR/Trellix: ransomware/RANSOM_netwalker.yar
source: ATR/Trellix
Recent victims
Loading…
Onion infrastructure
1 known- http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Source
Updated 5 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
