Inactive ransomware operator
← All groupsPandora
5 victims indexed · first seen 4 years ago · last activity 4 years ago
At a glance
- Status
- inactive
- First seen
- 4 years ago
- Last activity
- 4 years ago
- Onion sites
- 2 known endpoints
About
References
12 linksExternal sources curated by the MISP threat-intel community.
- twitter.com/malwrhunterteam/status/1501857263493001217
- dissectingmalwa.re/blog/pandora
- blog.cyble.com/2022/03/15/deep-dive-analysis-pandora-ransomware/
- cloudsek.com/technical-analysis-of-emerging-sophisticated-pandora-ransomware-group/
- dissectingmalwa.re/blog/pandora/
- kienmanowar.wordpress.com/2022/03/21/quicknote-analysis-of-pandora-ransomware/
- fortinet.com/blog/threat-research/Using-emulation-against-anti-reverse-engineering-techniques
- fortinet.com/blog/threat-research/looking-inside-pandoras-box
- microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself
- microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/
- secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader
- ransomlook.io/group/pandora
Timeline
1 monthsMITRE ATT&CK
4 techniques · 4 tacticsTactics
Recent victims
Loading…
Onion infrastructure
2 known- http://pandoraxyz.xyz
- http://vbfqeh5nugm6r2u2qvghsdxm3fotf5wbxb5ltv6vw77vus5frdpuaiid.onion
Source
Updated 4 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
