29 New Ransomwares Discovered by Malware Researchers in May

Threat Actor: Malware Researchers | Malware Researchers
Victim: Individuals and businesses
Price: Not specified
Exfiltrated Data Type: Valuable data on infected systems


In May, cybersecurity experts have identified of 29 new variants of ransomware. These malicious programs, characterized by their insidious nature, pose a significant threat to individuals and businesses alike. With each new variant, cybercriminals are refining their tactics, making detection and mitigation increasingly challenging. Ransomware operates by encrypting valuable data on infected systems, rendering it inaccessible to users. Subsequently, the perpetrators demand exorbitant ransoms for the decryption keys, effectively holding critical information hostage. This nefarious practice not only jeopardizes the integrity of personal and sensitive data but also imposes substantial financial burdens on victims.

  • Wormhole
    • SHA-256: dff3fd0197c5ea432f58f62a5f40dfa8e0cdc3ecca36bcf3221962349fbd9a22
    • Extensions: .Wormhole
  • KUZA
    • SHA-256: 38514f16f9eac49a8bd59cfe7785a74b5eb0b6af88d0a3ea505a1997dab0bd91
    • Extensions: .Ripa
  • Qepi – Qehu
    • SHA-256: 8c12844b80c111537bb80e1bcb33d7db8cc334cfb15cc0e3496f7f793f5ed1b6
    • SHA-256: 78b8e716db280ca8806dfa21824b993c592c33baba2a238cf2bd839f454a9cbe
    • Extensions: .qepi – .qehu
  • Baaa
    • SHA-256: a566a28f3b860689ea801f9b2c454114e3d019c33017df7ef5859b78953b0415
    • Extensions: .baa
  • MALARIA
    • SHA-256: ac6ec3ca2a4592fb046ee52b214c89fd6b84164009a670703ea05021f0683172
    • Extensions: .Four random characters
  • Xam
    SHA-256: 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
    Extensions: .xam
  • Qeza
    SHA-256: 110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
    Extensions: .qeza
  • Vepi
    SHA-256: 143292ae66435a28f45d126b6e75df33cb156cf9ae85ed16b01967d18bcfe50a
    Extensions: .vepi
  • EnigmaWave
    SHA-256: 7d6f763b685ede93123551f651e60829b4fab9f9794690448f67af18dc544588
    Extensions: .EnigmaWave
  • Paaa
    SHA-256: 2bd6f0743a3ecab9f463af0a244ccf98bcc0fe5a3f28f048dbb15112e5a214ff
    Extensions: .paaa
  • Vehu
    SHA-256: ced7e605bdf92c0e2a05709f6bb8c7a287e06839f5e21455857838644e68b991
    Extensions: .vehu
  • Scrypt
    SHA-256: aeeef616860df5ac0bcf37567fb1476d8d60ecc3d9eb6b82515ad5d5c3d5218d
    Extensions: .Scrypt
  • Capibara
    SHA-256: 923dddc478a17d0adf0c86d1b5eb709ea4b48114cbb2c0e72052bd69caae95b2
    Extensions: .capibara
  • Lilium
    SHA-256: 153a11e6dfe886a1950c874309f33cee72411bce30d283ece10b8f2d5870ca03
    Extensions: .lilium
  • EDHST
    SHA-256: d4b56f96610c77077b4171a6b01ac31cc2c633f41b686661608ae78b42de5744
    Extensions: .EDHST
  • OPIX
    SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
    Extensions: .OPIX
  • GhosHacker
    SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
    Extensions: .red
  • Veza
    SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
    Extensions: .veza
  • OCEANS
    SHA-256: c9bd1abfb6e520d973284f2fbebaf14cd1cf5db7c2e2956e9d4a9b0564547b81
    Extensions: .Four random characters
  • ZHO
    SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
    Extensions: .Four random characters
  • Anyv
    SHA-256: 4725df43c79dcfd0fe697f25b3de122951e18d7391323f0892a16558731f2e39
    Extensions: .Anyv
  • EMBARGO
    SHA-256: 98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
    Extensions: .564ba1
  • SRC
    SHA-256: 994fd55de0c9a0d2c9011155d76adfe71b4a6f3c5a0bb802269a204e959f61b7
    Extensions: .SRC
  • CAMBIARE ROTTA
    SHA-256: 524a898e18999ceac864dbac5b85fa2f14392e389b3c32f77d58e2a89cdf01c4
    Extensions: .Four random characters
  • Zonix
    SHA-256: b133659131275c23e39afef14d7e23d09b42cd7e93650b63d8669b8d20c5c751
    Extensions: .ZoN
  • Nett
    SHA-256: 1a024d3f05a2d28f7edc493c544f9622cc7610d06f3a25ebb35e46232ff368d6
    Extensions: .nett
  • Wintz
    SHA-256: bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17
    Extensions: .Four random characters
  • Boost
    SHA-256: b39912902d5a05d383c19dc93bace94d57b1287bd77b889b0f7cd1ba8433e82e
    Extensions: .boost
  • QRYPT
    SHA-256: 7628448a6ad01b9260b067d420d32564f33d750a09aeb76fb927ba15567efe84
    Extensions: .qcrypt

Original Source: https://dailydarkweb.net/29-new-ransomwares-are-detected-by-malware-researchers-in-may/