Threat Actor Profile
Description
According to PCrisk, Yanluowang is ransomware that encrypts (and renames) files, ends all running processes, stops services, and creates the README.txt file containing a ransom note. It appends the .yanluowang extension to filenames. Cybercriminals behind Yanluowang are targeting enterprise entities and organizations in the financial sector.Files encrypted by Yanluowang can be decrypted with this tool (it is possible to decrypt all files if the original file is larger than 3GB. If the original file is smaller than 3GB, then only smaller files can be decrypted).
Confidence Score
Tags
First Seen
Unknown
Last Updated
Unknown
Active Status
ActiveCreated
April 29, 2026
Indicators of Compromise
Loading IOCs…
IOC KQL for Sentinel
STIX Data
{'added_date': None,
'client': '2003264@sit.singaporetech.edu.sg',
'description': 'According to PCrisk, Yanluowang is ransomware that encrypts '
'(and renames) files, ends all running processes, stops '
'services, and creates the README.txt file containing a ransom '
'note. It appends the .yanluowang extension to filenames. '
'Cybercriminals behind Yanluowang are targeting enterprise '
'entities and organizations in the financial sector.Files '
'encrypted by Yanluowang can be decrypted with this tool (it '
'is possible to decrypt all files if the original file is '
'larger than 3GB. If the original file is smaller than 3GB, '
'then only smaller files can be decrypted).',
'firstseen': '2022-07-02T18:46:02.242140+00:00',
'group': 'yanluowang',
'has_negotiations': False,
'has_ransomnote': True,
'lastseen': '2022-08-10T16:48:46.051826+00:00',
'locations': [{'available': False,
'fqdn': 'jukswsxbh3jsxuddvidrjdvwuohtsy4kxg2axbppiyclomt2qciyfoad.onion',
'slug': 'http://jukswsxbh3jsxuddvidrjdvwuohtsy4kxg2axbppiyclomt2qciyfoad.onion',
'title': 'Yanluowang',
'type': 'DLS'}],
'negotiation_count': 0,
'ransomnotes_count': 1,
'tiaras_metadata': {'has_negotiations': False,
'has_ransomnote': True,
'locations': [{'available': False,
'fqdn': 'jukswsxbh3jsxuddvidrjdvwuohtsy4kxg2axbppiyclomt2qciyfoad.onion',
'slug': 'http://jukswsxbh3jsxuddvidrjdvwuohtsy4kxg2axbppiyclomt2qciyfoad.onion',
'title': 'Yanluowang',
'type': 'DLS'}],
'negotiation_count': 0,
'ransomnotes_count': 1,
'ransomware_live_group': 'yanluowang',
'tools': {'CredentialTheft': ['GrabChrome',
'GrabFF',
'KeeThief',
'Mimikatz',
'NirSoft '
'WebBrowserPassView'],
'DefenseEvasion': [],
'DiscoveryEnum': ['AdFind',
'Cent Browser',
'S3 Browser',
'SoftPerfect NetScan'],
'Exfiltration': [],
'LOLBAS': ['NTDS Utility (ntdsutil)',
'PsExec',
'Windows Event Utility (wevtutil)'],
'Networking': ['Chisel'],
'Offsec': ['Cobalt Strike', 'Impacket'],
'RMM-Tools': ['LogMeIn',
'ScreenConnect',
'TeamViewer']},
'url': 'https://www.ransomware.live/group/yanluowang',
'victims': 6,
'vulnerabilities': []},
'tiaras_source': 'ransomware.live',
'tools': {'CredentialTheft': ['GrabChrome',
'GrabFF',
'KeeThief',
'Mimikatz',
'NirSoft WebBrowserPassView'],
'DefenseEvasion': [],
'DiscoveryEnum': ['AdFind',
'Cent Browser',
'S3 Browser',
'SoftPerfect NetScan'],
'Exfiltration': [],
'LOLBAS': ['NTDS Utility (ntdsutil)',
'PsExec',
'Windows Event Utility (wevtutil)'],
'Networking': ['Chisel'],
'Offsec': ['Cobalt Strike', 'Impacket'],
'RMM-Tools': ['LogMeIn', 'ScreenConnect', 'TeamViewer']},
'ttps': [],
'url': 'https://www.ransomware.live/group/yanluowang',
'victims': 6,
'vulnerabilities': []}