Thursday, May 8, 2025
Homecyber securityRagnar Loader Used by Multiple Ransomware Groups to Bypass Detection

Ragnar Loader Used by Multiple Ransomware Groups to Bypass Detection

Published on

SIEM as a Service

Follow Us on Google News

Ragnar Loader, a sophisticated toolkit associated with the Ragnar Locker ransomware group, has been instrumental in facilitating targeted cyberattacks on organizations since its emergence in 2020.

This malware is part of the Monstrous Mantis ransomware ecosystem and is designed to maintain persistent access to compromised systems, enabling sustained malicious operations.

Ragnar Loader employs advanced tactics such as multi-layered obfuscation, dynamic decryption routines, and sophisticated persistence mechanisms to evade detection and maintain operational resilience.

- Advertisement - Google News
Ragnar Loader
New codeblock that appear after decryption.

The Ragnar Loader toolkit includes several critical components, such as PowerShell scripts for remote desktop functionality, a pivoting script for lateral movement within networks, and a remote code execution script.

According to Catalyst Report, these scripts are deliberately obfuscated to facilitate the loading of binary files and the execution of process injection techniques within target systems.

For instance, the RunScheduledTask.ps1 script uses WMI filters to achieve fileless persistence, creating filters that run at specific intervals to maintain the malware’s presence on compromised systems.

Technical Analysis and Evasion Techniques

Ragnar Loader’s technical prowess lies in its ability to leverage strong encryption and encoding methods, including RC4 and Base64, to conceal its operations.

It employs sophisticated process injection strategies to establish stealthy control over compromised systems.

The malware utilizes a .NET loader that decrypts byte arrays by first decompressing them and then applying RC4 decryption.

The execution is handed over to shellcode, which exhibits self-modifying behavior and integrates anti-analysis techniques to hinder detection and analysis.

Ragnar Loader
Decryption routine of the shellcode.

The shellcode dynamically decrypts strings during runtime and intentionally flattens the control flow of critical functions to obscure logic.

Despite these measures, tools like FLOSS and D810 can effectively bypass these obfuscations, allowing analysts to deobfuscate stack strings and restore the original control flow.

The backdoor can accept multiple commands from the command and control server, including loading DLL plugins, executing shellcode, and exfiltrating file contents.

Impact and Persistence

Ragnar Loader’s persistence mechanisms are particularly noteworthy.

It uses scheduled tasks and WMI filters to ensure continuous operation on compromised systems.

The malware injects its payload into legitimate Windows processes, such as WmiPrvSE.exe, to enhance stealth and evasion capabilities.

This approach allows Ragnar Loader to maintain a long-term foothold within targeted environments, posing significant challenges to conventional security defenses and detection methodologies.

As a result, Ragnar Loader has become a critical tool for multiple ransomware groups seeking to bypass detection and maintain operational resilience in compromised systems.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...