Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Chaos Ransomware

98
Global rank
43 infographic chevron month
Month rank
56 infographic chevron week
Week rank
0
IOCs

Chaos ransomware is a malware family known for its destructive capabilities and diverse variants. It first appeared in 2021 as a ransomware builder and later acted as a wiper. Unlike most ransomware strains that encrypt data to extort payment, early Chaos variants permanently corrupted files, while later versions adopted more conventional encryption techniques.

Ransomware
Type
Unknown
Origin
1 June, 2021
First seen
21 May, 2025
Last seen
Also known as
Yashma

How to analyze Chaos Ransomware with ANY.RUN

Type
Unknown
Origin
1 June, 2021
First seen
21 May, 2025
Last seen

IOCs

IP addresses
170.178.168.203
Domains
moonpay.com
almondtradingltd.com
Last Seen at

Recent blog posts

post image
How Adversary Telegram Bots Help to Reveal Th...
watchers 467
comments 0
post image
We’re 9! Special Thanks (and Special Offers)...
watchers 253
comments 0
post image
ANY.RUN Becomes a Gold Winner in Threat Intel...
watchers 392
comments 0

What is Chaos Ransomware?

Observed since 2021, Chaos Ransomware has undergone an eventful yet rapid evolution. At its early stage, it branded itself as “Ryuk .Net Ransomware Builder” and mimicked Ryuk ransom notes but actually had little in common with Ryuk. Later it became known as Yashma and was spotted functioning as a wiper, a remote access trojan (RAT) and DDoS botnet (Kaiji variant).

Written in Golang, it targets both Windows and Linux systems across various hardware architectures. Unlike traditional ransomware, Chaos often corrupts files beyond recovery rather than providing a decryption option, making it particularly dangerous.

The malware attacks critical infrastructure sectors like manufacturing, healthcare, and energy, but also is a constant menace to SMEs with limited cybersecurity resources since its low-cost deployment via ransomware-as-a-service (RaaS) models makes it accessible to less sophisticated cybercriminals.

Chaos ransomware employs common yet effective methods to gain initial access to networks:

  • Phishing and Social Engineering;
  • Exploit Kits and Vulnerabilities (e.g. misconfigured Apache Tomcat servers);
  • Malvertising and Compromised Websites (particularly those running outdated CMS versions, e.g.WordPress);
  • Remote Code Execution (RCE), often targeting weak authentication protocols or unpatched software;
  • Fake Software Updates;
  • Trojanized Installers or cracked software (commonly found on torrent sites);
  • Post-Exploitation Deployment via tools like Cobalt Strike or remote access trojans (RATs).

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Chaos Ransom’s Prominent Features

Chaos is notable for:

  • Widespread availability: Chaos as a ransomware builder allows even low-skilled actors create their own variants.
  • Fast mutation: the ease of customization leads to countless versions, making signature-based defenses ineffective.
  • Dual-purpose use: Chaos can be used both as ransomware and as a wiper, making it appealing for political or destructive campaigns.
  • Irrecoverable data loss: early versions destroy files rather than encrypt them.

Once inside, Chaos affiliates use tools like AngryIPScanner, Nmap, or PowerShell to map networks and identify high-value targets for encryption or data exfiltration.

Once deployed, Chaos ransomware follows a typical ransomware kill chain. It ensures persistence by leveraging system startup scripts, such as init.d or systemd, to execute malicious files (e.g., /boot/System.img.config) on boot. Then it encrypts files and may exfiltrate sensitive data for double-extortion tactics. A ransom note is generated, demanding payment in cryptocurrency.

The malware may attempt to disable recovery features and security tools and delete shadow copies. Evasion techniques include code obfuscation, packing and encryption, fileless execution in some versions, and use of legitimate certificates in rare cases. Polymorphism is also important: multiple Chaos builds differ in structure and behavior, frustrating signature-based antivirus tools.

Chaos’s Execution Process and Technical Details

A sample of Chaos ransomware can be thoroughly studied in the safe environment of ANY.RUN’s Interactive Sandbox with its processes, artifacts, and the typical kill chain.

View Chaos in action.

Chaos Ransomware analysis in ANY.RUN Sandbox Chaos Ransomware sample in ANY.RUN's Interactive Sandbox

The execution chain of Chaos ransomware typically starts with phishing emails that carry malicious LNK shortcuts. Opening one of these files launches obfuscated PowerShell commands that retrieve a self-extracting archive from a remote server. The archive contains the Chaos ransomware executable together with loaders for additional malware. Once run, Chaos copies itself to a hidden location such as %AppData%\windowsdefender.exe and achieves persistence by placing a shortcut in the Windows Startup folder, guaranteeing execution after every reboot.

Chaos ransomware processes Chaos processes graph

After persistence is in place, Chaos spawns a new process to encrypt the victim’s files. It targets specific extensions to maximize damage and uses vssadmin, WMIC, wbadmin, and bcdedit to delete shadow copies and disable other backup mechanisms. By scanning the file system and encrypting valuable data, it effectively blocks the user’s access. Chaos ransomware also changes the desktop wallpaper on the infected system.

When encryption is complete, Chaos may contact its command-and-control (C2) server to upload encryption keys and system details. This channel also delivers ransom-payment instructions and, if the attackers choose, additional payloads or a decryption key once payment is confirmed. Finally, the victim receives a ransom note outlining the steps required to regain access to their data.

What are the best-known Chaos attacks?

  • “File Corruption” Campaigns (2021–2022). Many victims reported irrecoverable data loss instead of encryption. These attacks mostly hit small businesses and individuals. Chaos spread widely across forums, affecting users who downloaded pirated software or opened phishing emails.
  • Targeting Healthcare & Education Sectors (2022). Chaos ransomware builders were used in several attacks against small hospitals, private schools and colleges, municipal organizations. Systems mostly were rendered unusable even if ransoms were paid.
  • CHAOS 4.0 & 5.0 “Actual Encryption” Campaigns. More organized groups began using Chaos as an entry-level extortion tool, but these versions still lacked features of advanced ransomware (like data exfiltration). These versions switched from file destruction to proper AES encryption.

Chaos ransomware is not associated with famous victim names because:

  • It’s a ransomware builder, not a specific group’s tool.
  • It’s used by script kiddies, lone hackers, and non-sophisticated actors.
  • It targets low-hanging fruit, like poorly secured RDP servers or people downloading pirated software.
  • Most campaigns are uncoordinated, small-scale, and poorly operationalized.

Gathering Threat Intelligence on Chaos Ransomware

Threat Intelligence plays a key role in detecting and countering Chaos ransomware. IOCs must be gathered to enable monitoring and prevention: IP addresses and domains for C2 servers, file names and hashes.

Start with searching by the malware’s name via Threat Intelligence Lookup to find an assortment of fresh public analyses and harvest IOCs for tuning your security systems.

threatName:"Chaos"

Chaos ransomware public analyses Recent Chaos samples dissected in the sandbox

TI Lookup also provides sandbox reports containing behavioral analysis of Chaos samples. You'll be able to see how the use of vssadmin, bcdedit, and wbadmin to remove backups, overwriting of small files, unusual PowerShell or script activities trigger detection of Chaos variants.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Chaos ransomware is a multifaceted threat that combines ransomware, RAT, and DDoS capabilities. It is a significant risk to diverse industries, particularly those with unpatched systems or sensitive data. Its ability to infiltrate networks via phishing, exploits, and fake updates, coupled with advanced evasion techniques like port-hopping and binary obfuscation, requires robust detection and response strategies.

By leveraging threat intelligence, anomaly-based detection, and proactive countermeasures like Zero Trust and chaos engineering, organizations can mitigate Chaos’s impact.

Employ Threat Intelligence Lookup to counter Chaos: start with 50 test requests.

HAVE A LOOK AT

Zloader screenshot
Zloader
zloader trojan loader
Zloader is a banking trojan that uses webinjects and VNC clients to still banking credentials. This Trojan is based on leaked code from 2011, but despite its age, Zloader’s popularity has been only increasing through early 2020, when it relied on COVID-19 themed attacks.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More
Mallox screenshot
Mallox
mallox
Mallox is a ransomware strain that emerged in 2021, known for its ability to encrypt files and target database servers using vulnerabilities like RDP. Often distributed through phishing campaigns and exploiting exposed SQL servers, it locks victims' data and demands a ransom. Mallox operates as a Ransomware-as-a-Service (RaaS), making it accessible to affiliates who use it to conduct attacks.
Read More
Havoc screenshot
Havoc
havoc
Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.
Read More
MetaStealer screenshot
MetaStealer
metastealer
MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More