Gunra Ransomware Emerges with New DLS
A new ransomware group called Gunra has emerged with a Dedicated Leak Site (DLS) in April 2025. Gunra's code shows similarities to the infamous Conti ransomware, suggesting it may be leveraging Conti's leaked source code. The group employs aggressive tactics, including a time-based pressure technique that forces victims to begin negotiations within five days. Gunra ransomware encrypts files using a combination of RSA and ChaCha20 algorithms, excludes certain folders and file types from encryption, and drops a ransom note named 'R3ADM3.txt'. The ransomware also deletes volume shadow copies to hinder recovery efforts. As the threat of DLS ransomware grows, organizations are advised to implement robust security measures, including regular updates, backups, and user education.
AI Analysis
Technical Summary
Gunra ransomware is a newly identified ransomware threat that surfaced in April 2025, notable for its Dedicated Leak Site (DLS) used to pressure victims into paying ransom. The ransomware's codebase shows significant similarities to the infamous Conti ransomware, indicating that Gunra likely leverages the leaked source code of Conti. This connection suggests a sophisticated lineage and potentially similar attack methodologies. Gunra employs a hybrid encryption scheme combining RSA asymmetric encryption with the ChaCha20 symmetric cipher, a modern and efficient algorithm, to encrypt victim files. It selectively excludes certain folders and file types from encryption, which may be a tactic to maintain system stability or avoid detection. The ransomware drops a ransom note named 'R3ADM3.txt' to inform victims of the attack and payment instructions. A notable aggressive tactic Gunra uses is a time-based pressure mechanism that forces victims to initiate ransom negotiations within five days, increasing psychological pressure and urgency. Additionally, Gunra deletes volume shadow copies on infected systems, a common ransomware technique to prevent victims from restoring files via Windows' native backup mechanisms, thereby increasing the likelihood of ransom payment. The ransomware is associated with multiple MITRE ATT&CK techniques including T1489 (Service Stop), T1106 (Execution through API), T1083 (File and Directory Discovery), T1566 (Phishing), T1078 (Valid Accounts), T1486 (Data Encrypted for Impact), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), and T1490 (Inhibit System Recovery). Indicators of compromise include multiple file hashes provided by AlienVault OTX. While no known exploits in the wild have been reported yet, the presence of a DLS and aggressive negotiation tactics indicate an active and evolving threat. Organizations are advised to maintain robust security postures, including patch management, regular backups, and user awareness training to mitigate phishing and credential compromise risks.
Potential Impact
For European organizations, Gunra ransomware represents a significant operational and financial risk. The encryption of critical files combined with deletion of volume shadow copies severely impairs recovery efforts, potentially leading to prolonged downtime and data loss. The use of a DLS increases reputational damage risks, as stolen data may be publicly leaked if ransoms are not paid, which could also lead to regulatory penalties under GDPR for data breaches. The five-day negotiation pressure tactic may force hasty decisions, increasing the likelihood of ransom payment and financial loss. Sectors with high-value data such as healthcare, finance, manufacturing, and critical infrastructure are particularly vulnerable. The ransomware’s similarity to Conti suggests it may adopt similar lateral movement and privilege escalation tactics, increasing the risk of widespread network compromise. European organizations with insufficient segmentation, weak credential management, or poor user training are at elevated risk. The threat also complicates incident response due to its sophisticated encryption and anti-recovery measures, potentially increasing incident response costs and operational disruption.
Mitigation Recommendations
1. Implement robust network segmentation to limit lateral movement within corporate networks. 2. Enforce strict multi-factor authentication (MFA) on all remote access and privileged accounts to reduce the risk of credential compromise. 3. Conduct regular phishing awareness training tailored to recognize social engineering tactics associated with ransomware delivery. 4. Maintain frequent, tested offline and immutable backups to enable recovery without paying ransom; ensure backups are isolated from the main network. 5. Monitor for indicators of compromise such as the provided file hashes and unusual file encryption activity. 6. Deploy endpoint detection and response (EDR) solutions capable of detecting ransomware behaviors, including volume shadow copy deletion and suspicious encryption processes. 7. Apply the principle of least privilege to limit user and service account permissions. 8. Regularly update and patch all systems and software to close vulnerabilities that could be exploited for initial access. 9. Establish and rehearse incident response plans specifically addressing ransomware scenarios, including communication strategies for DLS exposure. 10. Monitor threat intelligence feeds for updates on Gunra TTPs and indicators to adapt defenses promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
Indicators of Compromise
- hash: 0339269cef32f7af77ce9700ce7bf2e2
- hash: 3178501218c7edaef82b73ae83cb4d91
- hash: 7dd26568049fac1b87f676ecfaac9ba0
- hash: 92e11df03725e29d963d44508d41a8dd
- hash: 9a7c0adedc4c68760e49274700218507
- hash: 08a3b8d6f5f386a0a86ac39b5cdcc1e5dbbf42e2
- hash: 77b294117cb818df701f03dc8be39ed9a361a038
- hash: bb79502d301ba77745b7dbc5df4269fc7b074cda
- hash: 6d25d5c988a8cda3837dff5f294cbc25c97aea48dde1a74cba71a2439cab0a11
- hash: 854e5f77f788bbbe6e224195e115c749172cd12302afca370d4f9e3d53d005fd
- hash: a82e496b7b5279cb6b93393ec167dd3f50aff1557366784b25f9e51cb23689d9
Gunra Ransomware Emerges with New DLS
Description
A new ransomware group called Gunra has emerged with a Dedicated Leak Site (DLS) in April 2025. Gunra's code shows similarities to the infamous Conti ransomware, suggesting it may be leveraging Conti's leaked source code. The group employs aggressive tactics, including a time-based pressure technique that forces victims to begin negotiations within five days. Gunra ransomware encrypts files using a combination of RSA and ChaCha20 algorithms, excludes certain folders and file types from encryption, and drops a ransom note named 'R3ADM3.txt'. The ransomware also deletes volume shadow copies to hinder recovery efforts. As the threat of DLS ransomware grows, organizations are advised to implement robust security measures, including regular updates, backups, and user education.
AI-Powered Analysis
Technical Analysis
Gunra ransomware is a newly identified ransomware threat that surfaced in April 2025, notable for its Dedicated Leak Site (DLS) used to pressure victims into paying ransom. The ransomware's codebase shows significant similarities to the infamous Conti ransomware, indicating that Gunra likely leverages the leaked source code of Conti. This connection suggests a sophisticated lineage and potentially similar attack methodologies. Gunra employs a hybrid encryption scheme combining RSA asymmetric encryption with the ChaCha20 symmetric cipher, a modern and efficient algorithm, to encrypt victim files. It selectively excludes certain folders and file types from encryption, which may be a tactic to maintain system stability or avoid detection. The ransomware drops a ransom note named 'R3ADM3.txt' to inform victims of the attack and payment instructions. A notable aggressive tactic Gunra uses is a time-based pressure mechanism that forces victims to initiate ransom negotiations within five days, increasing psychological pressure and urgency. Additionally, Gunra deletes volume shadow copies on infected systems, a common ransomware technique to prevent victims from restoring files via Windows' native backup mechanisms, thereby increasing the likelihood of ransom payment. The ransomware is associated with multiple MITRE ATT&CK techniques including T1489 (Service Stop), T1106 (Execution through API), T1083 (File and Directory Discovery), T1566 (Phishing), T1078 (Valid Accounts), T1486 (Data Encrypted for Impact), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), and T1490 (Inhibit System Recovery). Indicators of compromise include multiple file hashes provided by AlienVault OTX. While no known exploits in the wild have been reported yet, the presence of a DLS and aggressive negotiation tactics indicate an active and evolving threat. Organizations are advised to maintain robust security postures, including patch management, regular backups, and user awareness training to mitigate phishing and credential compromise risks.
Potential Impact
For European organizations, Gunra ransomware represents a significant operational and financial risk. The encryption of critical files combined with deletion of volume shadow copies severely impairs recovery efforts, potentially leading to prolonged downtime and data loss. The use of a DLS increases reputational damage risks, as stolen data may be publicly leaked if ransoms are not paid, which could also lead to regulatory penalties under GDPR for data breaches. The five-day negotiation pressure tactic may force hasty decisions, increasing the likelihood of ransom payment and financial loss. Sectors with high-value data such as healthcare, finance, manufacturing, and critical infrastructure are particularly vulnerable. The ransomware’s similarity to Conti suggests it may adopt similar lateral movement and privilege escalation tactics, increasing the risk of widespread network compromise. European organizations with insufficient segmentation, weak credential management, or poor user training are at elevated risk. The threat also complicates incident response due to its sophisticated encryption and anti-recovery measures, potentially increasing incident response costs and operational disruption.
Mitigation Recommendations
1. Implement robust network segmentation to limit lateral movement within corporate networks. 2. Enforce strict multi-factor authentication (MFA) on all remote access and privileged accounts to reduce the risk of credential compromise. 3. Conduct regular phishing awareness training tailored to recognize social engineering tactics associated with ransomware delivery. 4. Maintain frequent, tested offline and immutable backups to enable recovery without paying ransom; ensure backups are isolated from the main network. 5. Monitor for indicators of compromise such as the provided file hashes and unusual file encryption activity. 6. Deploy endpoint detection and response (EDR) solutions capable of detecting ransomware behaviors, including volume shadow copy deletion and suspicious encryption processes. 7. Apply the principle of least privilege to limit user and service account permissions. 8. Regularly update and patch all systems and software to close vulnerabilities that could be exploited for initial access. 9. Establish and rehearse incident response plans specifically addressing ransomware scenarios, including communication strategies for DLS exposure. 10. Monitor threat intelligence feeds for updates on Gunra TTPs and indicators to adapt defenses promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/89206"]
- Adversary
- Gunra
- Pulse Id
- 688219586599cc75ec92a318
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash0339269cef32f7af77ce9700ce7bf2e2 | — | |
hash3178501218c7edaef82b73ae83cb4d91 | — | |
hash7dd26568049fac1b87f676ecfaac9ba0 | — | |
hash92e11df03725e29d963d44508d41a8dd | — | |
hash9a7c0adedc4c68760e49274700218507 | — | |
hash08a3b8d6f5f386a0a86ac39b5cdcc1e5dbbf42e2 | — | |
hash77b294117cb818df701f03dc8be39ed9a361a038 | — | |
hashbb79502d301ba77745b7dbc5df4269fc7b074cda | — | |
hash6d25d5c988a8cda3837dff5f294cbc25c97aea48dde1a74cba71a2439cab0a11 | — | |
hash854e5f77f788bbbe6e224195e115c749172cd12302afca370d4f9e3d53d005fd | — | |
hasha82e496b7b5279cb6b93393ec167dd3f50aff1557366784b25f9e51cb23689d9 | — |
Threat ID: 6882986aad5a09ad0044295a
Added to database: 7/24/2025, 8:32:42 PM
Last enriched: 7/24/2025, 8:47:48 PM
Last updated: 7/25/2025, 11:21:40 PM
Views: 6
Related Threats
ThreatFox IOCs for 2025-07-25
MediumOperation CargoTalon targets Russia’s aerospace with EAGLET malware,
MediumThe average ransomware attack payment increased nearly 500% from 2023 to 2024.
LowOperation Checkmate: BlackSuit Ransomware’s Dark Web Domains Seized
MediumNASCAR Confirms Medusa Ransomware Breach After $4M Demand
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.