{"id":39337,"date":"2025-07-26T18:45:14","date_gmt":"2025-07-26T18:45:14","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/39337\/"},"modified":"2025-07-26T18:45:14","modified_gmt":"2025-07-26T18:45:14","slug":"new-gunra-ransomware-attacking-windows-computers-to-encrypt-files-and-deletes-shadow-copies","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/39337\/","title":{"rendered":"New Gunra Ransomware Attacking Windows Computers to Encrypt Files and Deletes Shadow Copies"},"content":{"rendered":"<p>            <a href=\"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUqXyrc99Eo4Jxvuw0rsu-VAQKFmJs8WKDbos3jXyUu534myhGMcFBNq1dTwljzV5gAPJCn8s97GS9S-wzucHdp9bxDa3k12B8pcXXddeeaaBs68AAjiubMwg43CHeN1hvjd_NrvQ9iv68pLI-2zE_CnDmiVt9owe6WwVRvsBYNbjGMY2RrPbG00DKQfk\/s16000\/New%20Gunra%20Ransomware%20Attacking%20Windows%20Computers%20to%20Encrypt%20Files%20and%20Deletes%20Shadow%20Copies.webp?w=1600&amp;resize=1600,900&amp;ssl=1\" data-caption=\"\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" post-id=\"117681\" fifu-featured=\"1\" width=\"696\" height=\"\" class=\"entry-thumb td-modal-image\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/New Gunra Ransomware Attacking Windows Computers to Encrypt Files and Deletes Shadow Copies.webp\" alt=\"New Gunra Ransomware Attacking Windows Computers to Encrypt Files and Deletes Shadow Copies\" title=\"New Gunra Ransomware Attacking Windows Computers to Encrypt Files and Deletes Shadow Copies\"\/><\/a><\/p>\n<p>The recently uncovered Gunra ransomware is the family to weaponize leaked Conti source code, unleashing rapid-fire double-extortion attacks against Windows endpoints worldwide.<\/p>\n<p>First seen on dark-web leak sites in April 2025, Gunra moves with blistering speed, pressuring victims to negotiate within five days and threatening public data dumps to multiply the pain.<\/p>\n<p>Unlike spray-and-pray spam campaigns, the operators favor hands-on <a href=\"https:\/\/cybersecuritynews.com\/huntgpt\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">intrusion<\/a>, typically breaching networks through stolen RDP credentials or unpatched VPN gateways before pivoting laterally to domain controllers.<\/p>\n<p><a href=\"https:\/\/news.google.com\/publications\/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">&#13;<br \/>\n<img decoding=\"async\" src=\"https:\/\/thecybernews.com\/gnews.svg\" alt=\"Google News\"\/><\/a><\/p>\n<p>Once administrative footholds are secured, the malware is pushed to dozens of machines in minutes via PsExec or Group Policy, triggering simultaneous encryption that hobbles business operations.<\/p>\n<p>ASEC analysts <a href=\"https:\/\/asec.ahnlab.com\/en\/89206\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">noted<\/a> that more than a dozen enterprises across manufacturing, healthcare, and logistics reported interruptions traced to Gunra in its first three months of activity.<\/p>\n<p>Internally, the strain mirrors Conti\u2019s multithreaded model: it spawns as many encryption threads as there are logical CPU cores, maximizing disk throughput while minimizing dwell time.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/Creating an RSA key (Source - ASEC).webp.jpeg\" alt=\"\"\/>Creating an RSA key (Source \u2013 ASEC)<\/p>\n<p>Each thread generates an RSA-2048 key embedded in the binary to derive a ChaCha20 session key for file scrambling, then appends the \u201c.ENCRT\u201d extension.<\/p>\n<p>Crucially, the Trojan skips executable, driver, and system files to preserve OS stability, ensuring victims can still read the ransom note \u201cR3ADM3.txt\u201d left in every directory.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/Deleting the volume shadow copy (Source - ASEC).webp.jpeg\" alt=\"\"\/>Deleting the volume shadow copy (Source \u2013 ASEC)<\/p>\n<p>Gunra\u2019s parting shot is a surgical removal of Windows Shadow Copies. By driving WMI through WMIC, it enumerates every snapshot and deletes them via the following command:-<\/p>\n<p>cmd.exe \/c C:\\Windows\\System32\\wbem\\WMIC.exe shadowcopy where &#8220;ID={GUID}&#8221; delete<\/p>\n<p>Infection Mechanism<\/p>\n<p>At launch, Gunra creates a unique mutex, then calls GetNativeSystemInfo to size its thread pool.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/Creating a thread (Source - ASEC).webp.jpeg\" alt=\"\"\/>Creating a thread (Source \u2013 ASEC)<\/p>\n<p>If the host sports 16 CPU cores, the <a href=\"https:\/\/cybersecuritynews.com\/building-blocks-of-cybersecurity-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">malware<\/a> spawns 16 encryption routines, each carving 5 MB file chunks to feed the fn_FileCrypt function that wraps the ChaCha20 rounds shown below:-<\/p>\n<p>for(int j=8;j&gt;0;j-=2){<br \/>\n    v7+=v11;<br \/>\n    v19=((v7^v19)&gt;&gt;16)|((v7^v19)&gt;20)|((v15^v11)&lt;&lt;12);<br \/>\n    \/* \u2026additional quarter-rounds\u2026 *\/<br \/>\n}<\/p>\n<p>Because the RSA public key is hard-coded and never leaves memory, network traffic remains minimal, preventing perimeter-based detection.<\/p>\n<p>Endpoint defenses must therefore <a href=\"https:\/\/cybersecuritynews.com\/tenable-network-monitor-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">monitor<\/a> abnormal thread fan-out and aggressive WMIC shadow-copy deletions to spot Gunra before backups vanish.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(180deg,rgb(238,238,238) 90%,rgb(169,184,195) 100%)\">Experience faster, more accurate phishing detection and enhanced protection for your business with real-time sandbox analysis-&gt;\u00a0<a href=\"https:\/\/intelligence.any.run\/plans?utm_source=csn_jul&amp;utm_medium=article&amp;utm_campaign=freemium-exclusive&amp;utm_content=plans1&amp;utm_term=220725\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Try ANY.RUN now<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"The recently uncovered Gunra ransomware is the family to weaponize leaked Conti source code, unleashing rapid-fire double-extortion attacks&hellip;\n","protected":false},"author":2,"featured_media":39338,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[191,74],"class_list":{"0":"post-39337","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-computing","9":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/39337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=39337"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/39337\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/39338"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=39337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=39337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=39337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}