Alpha Ransomware Emerges From NetWalker Ashes [Friday, February 16, 2024]

Alpha ransomware first appeared in February 2023 and has strong similarities to the now-defunct NetWalker ransomware. Analysis shows code overlap b...
Alpha Ransomware Emerges From NetWalker Ashes [Friday, February 16, 2024]
Alpha Ransomware Emerges From NetWalker Ashes

Alpha Ransomware Emerges From NetWalker Ashes

Description :
Alpha ransomware first appeared in February 2023 and has strong similarities to the now-defunct NetWalker ransomware. Analysis shows code overlap between Alpha and NetWalker payloads. Both use a PowerShell-based loader and have similar execution flows, process/service killing logic, and configuration details. After initially maintaining a low profile, Alpha recently began scaling up attacks and launching a data leak site.

Published Created Modified
2024-02-16 14:38:32 2024-02-16 14:38:32 2024-02-16 15:15:45

Tags

Indicators

Malwares :
  • Alpha
Hashes :
  • 6462b8825e02cf55dc905dd42f0b4777dfd5aa4ff777e3e8fe71d57b7d9934e7
  • e573d2fec8731580ab620430f55081ceb7153d0344f2094e28785950fb17f499
  • a8d350bbe8d9ccfbb0c3e9c2dd9251c957d18ce13ae405ceb2f2d087c115db15
  • 89bfcbf74607ad6d532495de081a1353fc3cf4cd4a00df7b1ba06c10c2de3972
  • 6e204e39121109dafcb618b33191f8e977a433470a0c43af7f39724395f1343e
  • 5f3bf9c07eedde053f19ce134caa7587f8fb6c466e33256e1253f3a9450b7110
  • df15266a9967320405b3771d0b7353dc5a4fb1cbf935010bc3c8c0e2fe17fb94
  • 9d6ed8396ee79ae92a5e6cef718add321226def3461711cf585e0fd302c961ae
  • e68dd7f20cd31309479ece3f1c8578c9f93c0a7154dcf21abce30e75b25da96b
  • f5d25777331ba55d80e064dea72240c1524ffcd3870555a8c34ff5377def3729
  • b7ca6d401b051712cb5b1a388a2135921a4420db8fe41842d51d2ec27380b479
  • 0bad18cb64b14a689965540126e0adbc952f090f1fb7b6447fe897a073860cdb
  • f3858d29073ae90f90c9bb284913752533fe1a6437edd6536e4b1775fc8f6db4
  • c00fbf3fb992e7f237c396d69081246570cbd60d6c7a2262c01ae4d8e6f17ddd
  • 46569bf23a2f00f6bac5de6101b8f771feb972d104633f84e13d9bc98b844520
  • b2adf8ec7ab5193c7358f6acb30b003493466daee33ea416e3f703e744f73b7d
  • 2d07f0425dc465b3a1267a672c1293f9a3d0cd23106b7be490807fea490978ea
  • 9c71500a9472814f7bf97a462fe9822cf93dc41e2e34cc068734586d5e5146ef
  • 1c12ff296e7d9f90391e45f8a1d82d8140edf98d616a7da28741094d60d4779d
  • e43b1e06304f39dfcc5e59cf42f7a17f3818439f435ceba9445c56fe607d59ea
  • c5f7492a3e763b4456afbb181248fdb8e652575cea286db7861e97ffcd1b72e4
  • 480cf54686bd50157701d93cc729ecf70c14cd1acd2cb622b38fc25e23dfbc26
  • ab317c082c910cfe89214b31a0933eaab6c766158984f7aafb9943aef7ec6cbb
MITRE ATT&CK Techniques :

External References

You can download the txt file containing the indicators by clicking on the button below:

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.