Information & Disclaimer

Indicators of Compromise

Extracted IOCs from ransomware groups including file extensions, ransom note filenames, and other indicators. Export for use in your security tools and SIEM.

0Total IOCs
0File Extensions
0Filenames
0Groups

Usage Notice

These IOCs are extracted from ransomware samples and leak sites. Use them responsibly for threat hunting and detection. Some IOCs may generate false positives - always validate before taking action.

Showing 0 of 0 IOCs

Integration Guide

SIEM Integration

Export as CSV and import into your SIEM for automated detection rules.

EDR/XDR

Use file extensions to create file monitoring rules and alerts.

Threat Hunting

Search for these indicators in your environment logs and file systems.