Skip to main content

Gunra Ransomware Emerges with New DLS

Medium
Published: Thu Jul 24 2025 (07/24/2025, 11:30:32 UTC)
Source: AlienVault OTX General

Description

A new ransomware group called Gunra has emerged with a Dedicated Leak Site (DLS) in April 2025. Gunra's code shows similarities to the infamous Conti ransomware, suggesting it may be leveraging Conti's leaked source code. The group employs aggressive tactics, including a time-based pressure technique that forces victims to begin negotiations within five days. Gunra ransomware encrypts files using a combination of RSA and ChaCha20 algorithms, excludes certain folders and file types from encryption, and drops a ransom note named 'R3ADM3.txt'. The ransomware also deletes volume shadow copies to hinder recovery efforts. As the threat of DLS ransomware grows, organizations are advised to implement robust security measures, including regular updates, backups, and user education.

AI-Powered Analysis

AILast updated: 07/24/2025, 20:47:48 UTC

Technical Analysis

Gunra ransomware is a newly identified ransomware threat that surfaced in April 2025, notable for its Dedicated Leak Site (DLS) used to pressure victims into paying ransom. The ransomware's codebase shows significant similarities to the infamous Conti ransomware, indicating that Gunra likely leverages the leaked source code of Conti. This connection suggests a sophisticated lineage and potentially similar attack methodologies. Gunra employs a hybrid encryption scheme combining RSA asymmetric encryption with the ChaCha20 symmetric cipher, a modern and efficient algorithm, to encrypt victim files. It selectively excludes certain folders and file types from encryption, which may be a tactic to maintain system stability or avoid detection. The ransomware drops a ransom note named 'R3ADM3.txt' to inform victims of the attack and payment instructions. A notable aggressive tactic Gunra uses is a time-based pressure mechanism that forces victims to initiate ransom negotiations within five days, increasing psychological pressure and urgency. Additionally, Gunra deletes volume shadow copies on infected systems, a common ransomware technique to prevent victims from restoring files via Windows' native backup mechanisms, thereby increasing the likelihood of ransom payment. The ransomware is associated with multiple MITRE ATT&CK techniques including T1489 (Service Stop), T1106 (Execution through API), T1083 (File and Directory Discovery), T1566 (Phishing), T1078 (Valid Accounts), T1486 (Data Encrypted for Impact), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), and T1490 (Inhibit System Recovery). Indicators of compromise include multiple file hashes provided by AlienVault OTX. While no known exploits in the wild have been reported yet, the presence of a DLS and aggressive negotiation tactics indicate an active and evolving threat. Organizations are advised to maintain robust security postures, including patch management, regular backups, and user awareness training to mitigate phishing and credential compromise risks.

Potential Impact

For European organizations, Gunra ransomware represents a significant operational and financial risk. The encryption of critical files combined with deletion of volume shadow copies severely impairs recovery efforts, potentially leading to prolonged downtime and data loss. The use of a DLS increases reputational damage risks, as stolen data may be publicly leaked if ransoms are not paid, which could also lead to regulatory penalties under GDPR for data breaches. The five-day negotiation pressure tactic may force hasty decisions, increasing the likelihood of ransom payment and financial loss. Sectors with high-value data such as healthcare, finance, manufacturing, and critical infrastructure are particularly vulnerable. The ransomware’s similarity to Conti suggests it may adopt similar lateral movement and privilege escalation tactics, increasing the risk of widespread network compromise. European organizations with insufficient segmentation, weak credential management, or poor user training are at elevated risk. The threat also complicates incident response due to its sophisticated encryption and anti-recovery measures, potentially increasing incident response costs and operational disruption.

Mitigation Recommendations

1. Implement robust network segmentation to limit lateral movement within corporate networks. 2. Enforce strict multi-factor authentication (MFA) on all remote access and privileged accounts to reduce the risk of credential compromise. 3. Conduct regular phishing awareness training tailored to recognize social engineering tactics associated with ransomware delivery. 4. Maintain frequent, tested offline and immutable backups to enable recovery without paying ransom; ensure backups are isolated from the main network. 5. Monitor for indicators of compromise such as the provided file hashes and unusual file encryption activity. 6. Deploy endpoint detection and response (EDR) solutions capable of detecting ransomware behaviors, including volume shadow copy deletion and suspicious encryption processes. 7. Apply the principle of least privilege to limit user and service account permissions. 8. Regularly update and patch all systems and software to close vulnerabilities that could be exploited for initial access. 9. Establish and rehearse incident response plans specifically addressing ransomware scenarios, including communication strategies for DLS exposure. 10. Monitor threat intelligence feeds for updates on Gunra TTPs and indicators to adapt defenses promptly.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/89206"]
Adversary
Gunra
Pulse Id
688219586599cc75ec92a318
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0339269cef32f7af77ce9700ce7bf2e2
hash3178501218c7edaef82b73ae83cb4d91
hash7dd26568049fac1b87f676ecfaac9ba0
hash92e11df03725e29d963d44508d41a8dd
hash9a7c0adedc4c68760e49274700218507
hash08a3b8d6f5f386a0a86ac39b5cdcc1e5dbbf42e2
hash77b294117cb818df701f03dc8be39ed9a361a038
hashbb79502d301ba77745b7dbc5df4269fc7b074cda
hash6d25d5c988a8cda3837dff5f294cbc25c97aea48dde1a74cba71a2439cab0a11
hash854e5f77f788bbbe6e224195e115c749172cd12302afca370d4f9e3d53d005fd
hasha82e496b7b5279cb6b93393ec167dd3f50aff1557366784b25f9e51cb23689d9

Threat ID: 6882986aad5a09ad0044295a

Added to database: 7/24/2025, 8:32:42 PM

Last enriched: 7/24/2025, 8:47:48 PM

Last updated: 7/25/2025, 11:21:40 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats