Indicators of Compromise
Extracted IOCs from ransomware groups including file extensions, ransom note filenames, and other indicators. Export for use in your security tools and SIEM.
0Total IOCs
0File Extensions
0Filenames
0Groups
Usage Notice
These IOCs are extracted from ransomware samples and leak sites. Use them responsibly for threat hunting and detection. Some IOCs may generate false positives - always validate before taking action.
Showing 0 of 0 IOCs
Integration Guide
SIEM Integration
Export as CSV and import into your SIEM for automated detection rules.
EDR/XDR
Use file extensions to create file monitoring rules and alerts.
Threat Hunting
Search for these indicators in your environment logs and file systems.