diff --git a/clusters/ransomware.json b/clusters/ransomware.json index 4a14669..c814121 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -24191,7 +24191,23 @@ }, "uuid": "f84b92bb-d8e8-4ddd-848c-1a91df504e8e", "value": "DEcovid19" + }, + { + "description": "Ragnarok is is a ransomware that targetscorporate networks in Big Game Huntingtargeted attacks. The ransomware is associated with 'double-extortion' tactic, stealing and publishing files on a data leak site (DLS).", + "meta": { + "encryption": "AES", + "extensions": [ + ".ragnarok", + ".ragnarok_cry" + ], + "refs": [ + "https://malpedia.caad.fkie.fraunhofer.de/details/win.ragnaro", + "https://borncity.com/win/2021/03/27/tu-darmstadt-opfer-der-ragnarok-ransomware/" + ] + }, + "uuid": "fe7e4df0-97b9-4dd2-b3f8-79404fc8272d", + "value": "Ragnarok" } ], - "version": 96 + "version": 97 }