Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Bluesky

131
Global rank
113 infographic chevron month
Month rank
146 infographic chevron week
Week rank
0
IOCs

BlueSky ransomware, first identified in June 2022, shares code similarities with other well-known ransomware families like Conti and Babuk. It primarily spreads via phishing emails and malicious links and can propagate through networks using SMB protocols. BlueSky uses advanced evasion techniques, such as hiding its processes from debuggers via the NtSetInformationThread API, making it difficult for analysts to detect and mitigate its attacks.

Ransomware
Type
Unknown
Origin
1 May, 2022
First seen
11 December, 2025
Last seen

How to analyze Bluesky with ANY.RUN

Type
Unknown
Origin
1 May, 2022
First seen
11 December, 2025
Last seen

IOCs

Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 3195
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 568
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 567
comments 0

What is BlueSky ransomware?

BlueSky ransomware is a strain of malicious software that encrypts files on a victim's system, rendering them inaccessible until a ransom is paid. First detected in June 2022, it shares similarities with other notorious ransomware families like Conti and Babuk.

BlueSky spreads through methods such as phishing emails, malicious links, and network protocols like SMB (port 445 TCP). Once inside a system, it uses advanced evasion techniques, such as hiding threads from debuggers, to avoid detection. It targets both files and processes, encrypting files with RSA encryption and adding the ".bluesky" extension to them while maintaining operational stability by avoiding critical system processes.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

BlueSky ransomware technical details

BlueSky ransomware encrypts files on the infected system, spreads through network shares, and uses advanced evasion techniques to avoid detection.

The primary functionalities of BlueSky ransomware include:

  • Uses RSA encryption to lock files and adds a ".bluesky" extension to the affected files.
  • Avoids system-critical processes while terminating secondary ones to optimize encryption without causing a system crash.
  • Utilizes advanced anti-debugging techniques such as hiding threads from debuggers through the NtSetInformationThread API.
  • Writes specific registry keys, including x25519_pub and RECOVERYBLOB, which are essential for the encryption and decryption process.
  • Uses multi-threading to efficiently handle file encryption tasks, targeting both local files and network shares through SMB.

BlueSky ransomware execution process

To see how BlueSky operates, let’s upload its sample to the ANY.RUN sandbox.

BlueSky ransomware specifically targets files and processes for encryption. However, it strategically avoids critical system processes to prevent system crashes that could halt the encryption process prematurely. This selective targeting allows it to continue encrypting files while the system remains operational.

Encrypted files are marked with the “.bluesky” extension, and a ransom note is left in the directories containing the encrypted files.

Bluesky in ANY.RUN sandbox BlueSky ransom note displayed in ANY.RUN’s sandbox

Before the encryption takes place, the ransomware writes critical information to the system’s registry, such as x25519_pub and RECOVERYBLOB. These are used by the attackers to potentially decrypt files if the ransom is paid.

Bluesky registry manipulation Registry changes displayed by the ANY.RUN’s sandbox

One of BlueSky’s key features is its evasion tactics. It hides execution threads from debuggers using the NtSetInformationThread API, making it difficult for analysts and security tools to track its behavior in real-time. This advanced anti-debugging capability ensures that the malware can run stealthily in a compromised environment, minimizing the chances of detection.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

BlueSky ransomware distribution methods

Similar to other malware families like AsyncRAT and Lumma Stealer, BlueSky ransomware is distributed through a variety of methods, making it a versatile and dangerous threat. Here are the primary distribution methods:

  • Phishing emails: Delivered via emails containing malicious attachments or links that prompt users to download and execute ransomware.
  • SMB protocol (Server Message Block): Spreads across networks using SMB (Port 445 TCP), which makes it possible to infect multiple machines.
  • Trojanized software: Embedded in cracked or pirated software, which users unknowingly download from unreliable sources.
  • Malicious links: Spread through phishing websites or compromised legitimate sites, directing users to download the malware.

Gathering Threat Intelligence on BlueSky Ransomware

To gather up-to-date intelligence on BlueSky ransomware, use Threat Intelligence Lookup.

This service gives you access to a vast database of threat data, built on millions of malware analysis sessions conducted in the ANY.RUN sandbox. It allows you to search using over 40 parameters, such as IPs, file names, domains, and process artifacts. Bluesky lookup search Search query for Bluesky in ANY.RUN’s Threat Intelligence Lookup

Searching for BlueSky-related terms, such as threatName:"BlueSky", in TI Lookup brings up results related to this ransomware, including associated samples, network activity, and command-and-control (C2) communication.

Test the capabilities of Threat Intelligence Lookup and the ANY.RUN sandbox.

Conclusion

BlueSky ransomware is a dangerous threat due to its file encryption, network propagation, and advanced evasion techniques. To combat this, it's essential to use tools like ANY.RUN and proactively analyze suspicious files before they cause damage. ANY.RUN provides a real-time malware analysis platform, allowing users to safely investigate and understand malware behavior, while delivering detailed reports for actionable insights.

Sign up for a free ANY.RUN account today to start analyzing threats like BlueSky.

HAVE A LOOK AT

Ransomware screenshot
Ransomware
ransomware
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Read More
Trojan screenshot
Trojan
trojan trojan horse
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
Read More
XRed screenshot
XRed
xred
XRed operates as a stealthy backdoor, enabling cybercriminals to gain unauthorized remote access to infected systems. XRed has gained particular notoriety for its distribution through trojanized legitimate software and hardware drivers, making it exceptionally dangerous due to its ability to masquerade as trusted applications.
Read More
Tycoon 2FA screenshot
Tycoon 2FA
tycoon
Tycoon 2FA is a phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) protections, particularly targeting Microsoft 365 and Gmail accounts. Its advanced evasion techniques and modular architecture make it a significant threat to organizations relying on MFA for security.
Read More
Arechclient2 screenshot
Arechclient2
arechclient2
The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More