Tuesday, May 27, 2025
Homecyber securityRagnar Loader Used by Multiple Ransomware Groups to Bypass Detection

Ragnar Loader Used by Multiple Ransomware Groups to Bypass Detection

Published on

SIEM as a Service

Follow Us on Google News

Ragnar Loader, a sophisticated toolkit associated with the Ragnar Locker ransomware group, has been instrumental in facilitating targeted cyberattacks on organizations since its emergence in 2020.

This malware is part of the Monstrous Mantis ransomware ecosystem and is designed to maintain persistent access to compromised systems, enabling sustained malicious operations.

Ragnar Loader employs advanced tactics such as multi-layered obfuscation, dynamic decryption routines, and sophisticated persistence mechanisms to evade detection and maintain operational resilience.

- Advertisement - Google News
Ragnar Loader
New codeblock that appear after decryption.

The Ragnar Loader toolkit includes several critical components, such as PowerShell scripts for remote desktop functionality, a pivoting script for lateral movement within networks, and a remote code execution script.

According to Catalyst Report, these scripts are deliberately obfuscated to facilitate the loading of binary files and the execution of process injection techniques within target systems.

For instance, the RunScheduledTask.ps1 script uses WMI filters to achieve fileless persistence, creating filters that run at specific intervals to maintain the malware’s presence on compromised systems.

Technical Analysis and Evasion Techniques

Ragnar Loader’s technical prowess lies in its ability to leverage strong encryption and encoding methods, including RC4 and Base64, to conceal its operations.

It employs sophisticated process injection strategies to establish stealthy control over compromised systems.

The malware utilizes a .NET loader that decrypts byte arrays by first decompressing them and then applying RC4 decryption.

The execution is handed over to shellcode, which exhibits self-modifying behavior and integrates anti-analysis techniques to hinder detection and analysis.

Ragnar Loader
Decryption routine of the shellcode.

The shellcode dynamically decrypts strings during runtime and intentionally flattens the control flow of critical functions to obscure logic.

Despite these measures, tools like FLOSS and D810 can effectively bypass these obfuscations, allowing analysts to deobfuscate stack strings and restore the original control flow.

The backdoor can accept multiple commands from the command and control server, including loading DLL plugins, executing shellcode, and exfiltrating file contents.

Impact and Persistence

Ragnar Loader’s persistence mechanisms are particularly noteworthy.

It uses scheduled tasks and WMI filters to ensure continuous operation on compromised systems.

The malware injects its payload into legitimate Windows processes, such as WmiPrvSE.exe, to enhance stealth and evasion capabilities.

This approach allows Ragnar Loader to maintain a long-term foothold within targeted environments, posing significant challenges to conventional security defenses and detection methodologies.

As a result, Ragnar Loader has become a critical tool for multiple ransomware groups seeking to bypass detection and maintain operational resilience in compromised systems.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data

DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95%...

Government Calls on Organizations to Adopt SIEM and SOAR Solutions

In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications...

WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack

A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a...

Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors

Microsoft Threat Intelligence Center (MSTIC) has issued a critical warning about a cluster of...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data

DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95%...

Government Calls on Organizations to Adopt SIEM and SOAR Solutions

In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications...

WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack

A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a...