Neue Ransomware Ymir kooperiert bei Angriffen mit RustyStealer

Teilen:

A new ransomware family called ‘Ymir’ has been spotted in the wild, encrypting systems that were previously compromised by the RustyStealer infostealer malware.

RustyStealer is a known malware family first documented in 2021, but its appearance with ransomware demonstrates another example of the recent trend of cybercrime operations working together.

Nach Angaben von Kaspersky researchers who discovered Ymir during an incident response, the novel ransomware strain is notable for its in-memory execution, use of the African Lingala language in a code comment, use of PDF files as ransom notes, and its extension configuration options.

Although Kaspersky has found evidence that Ymir connects to external servers that might facilitate data exfiltration, the ransomware does not feature such a capability.

BleepingComputer has confirmed that the ransomware operation launchedin July 2024, when it started attacking companies worldwide.

Ymir follows RustyStealer infections

Kaspersky’s analysis revealed that Rusty stealer had infiltrated multiple systems within the targeted infrastructure two days before Ymir’s deployment.

RustyStealer, essentially a credential-harvesting tool, enabled attackers to gain unauthorized access to systems by compromising legitimate high-privilege accounts useful in lateral movement.

Lateral movement across the network was facilitated using tools like Windows Remote Management (WinRM) and PowerShell for remote control. At the same time, the attackers also installed tools like Process Hacker and Advanced IP Scanner.

Next, they executed scripts associated with the SystemBC malware and established covert channels, possibly for data exfiltration or command execution, with the attackers’ infrastructure.

After solidifying the foothold and possibly also stealing data using RustyStealer, Ymir ransomware was dropped as the final payload.

Ymir is a novel Windows ransomware strain that operates entirely from memory, leveraging functions like ‘malloc,’ ‘memove,’ and ‘memcmp,’ to evade detection.

Upon launch, it performs system reconnaissance by getting the system date and time, identifying running processes, and checking the system uptime, which can help determine whether it runs on a sandbox.

Next, it skips file extensions based on a hardcoded list to avoid rendering the system unbootable.

Ymir uses the ChaCha20 stream cipher, an advanced and fast encryption algorithm, to encrypt files on the victim’s system.

Encrypted files are appended with a random extension, like “.6C5oy2dVr6,” and a ransom note named “INCIDENT_REPORT.pdf” is generated from the “.data” section of the Ymir binary in all directories containing encrypted files.

The ransomware will also modify the Windows Registry “legalnoticecaption” value to show an extortion demand before a user logs in to an encrypted device.

The ransom note claims that data was stolen from the victim’s system, and Kaspersky hypothesizes that this might have occurred using tools deployed prior to Ymir.

Finally, Ymir scans the system for the presence of PowerShell and leverages it to delete its executable to evade identification and analysis.

Ymir's execution process

Ymir has not established a data leak site yet, but it could be that the threat actors have just started accumulating victim data.

Kaspersky warns that Ymir’s use of information stealers as access brokers could quickly make this new ransomware family a widespread threat.

Bill Toulas

 

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
4:30 am, Juli 14, 2025
Wetter-Symbol 19°C
L: 17° | H: 20°
overcast clouds
Luftfeuchtigkeit: 76 %
Druck: 1011 mb
Wind: 7 mph SSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:59 am
Sonnenuntergang: 9:12 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
17° | 20°°C 0 mm 0% 18 mph 76 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
15° | 20°°C 1 mm 100% 15 mph 78 % 1016 mb 0 mm/h
Mi. Juli 16 10:00 pm
Wetter-Symbol
14° | 27°°C 0.2 mm 20% 14 mph 73 % 1017 mb 0 mm/h
Do. Juli 17 10:00 pm
Wetter-Symbol
18° | 26°°C 1 mm 100% 8 mph 80 % 1017 mb 0 mm/h
Fr. Juli 18 10:00 pm
Wetter-Symbol
19° | 30°°C 0 mm 0% 12 mph 79 % 1015 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
17° | 18°°C 0 mm 0% 9 mph 76 % 1011 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 11 mph 59 % 1012 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 15 mph 39 % 1013 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
25° | 25°°C 0 mm 0% 18 mph 28 % 1013 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 15 mph 30 % 1013 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
19° | 19°°C 0 mm 0% 9 mph 45 % 1015 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 8 mph 61 % 1016 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 8 mph 72 % 1016 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€102,603.90
1.86%
Ethereum(ETH)
€2,573.88
1.82%
XRP(XRP)
€2.50
5.42%
Fesseln(USDT)
€0.86
0.00%
Solana(SOL)
€141.61
2.68%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.172872
2.06%
Shiba Inu(SHIB)
€0.000012
2.78%
Pepe(PEPE)
€0.000011
3.11%
Peanut das Eichhörnchen(PNUT)
€0.244556
5.81%
Nach oben scrollen