Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Chaos Ransomware

95
Global rank
65 infographic chevron month
Month rank
58 infographic chevron week
Week rank
0
IOCs

Chaos ransomware is a malware family known for its destructive capabilities and diverse variants. It first appeared in 2021 as a ransomware builder and later acted as a wiper. Unlike most ransomware strains that encrypt data to extort payment, early Chaos variants permanently corrupted files, while later versions adopted more conventional encryption techniques.

Ransomware
Type
Unknown
Origin
1 June, 2021
First seen
20 September, 2025
Last seen
Also known as
Yashma

How to analyze Chaos Ransomware with ANY.RUN

Type
Unknown
Origin
1 June, 2021
First seen
20 September, 2025
Last seen

IOCs

IP addresses
170.178.168.203
Domains
moonpay.com
almondtradingltd.com
Last Seen at
Last Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 482
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 575
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 3871
comments 0

What is Chaos Ransomware?

Observed since 2021, Chaos Ransomware has undergone an eventful yet rapid evolution. At its early stage, it branded itself as “Ryuk .Net Ransomware Builder” and mimicked Ryuk ransom notes but actually had little in common with Ryuk. Later it became known as Yashma and was spotted functioning as a wiper, a remote access trojan (RAT) and DDoS botnet (Kaiji variant).

Written in Golang, it targets both Windows and Linux systems across various hardware architectures. Unlike traditional ransomware, Chaos often corrupts files beyond recovery rather than providing a decryption option, making it particularly dangerous.

The malware attacks critical infrastructure sectors like manufacturing, healthcare, and energy, but also is a constant menace to SMEs with limited cybersecurity resources since its low-cost deployment via ransomware-as-a-service (RaaS) models makes it accessible to less sophisticated cybercriminals.

Chaos ransomware employs common yet effective methods to gain initial access to networks:

  • Phishing and Social Engineering;
  • Exploit Kits and Vulnerabilities (e.g. misconfigured Apache Tomcat servers);
  • Malvertising and Compromised Websites (particularly those running outdated CMS versions, e.g.WordPress);
  • Remote Code Execution (RCE), often targeting weak authentication protocols or unpatched software;
  • Fake Software Updates;
  • Trojanized Installers or cracked software (commonly found on torrent sites);
  • Post-Exploitation Deployment via tools like Cobalt Strike or remote access trojans (RATs).

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Chaos Ransom’s Prominent Features

Chaos is notable for:

  • Widespread availability: Chaos as a ransomware builder allows even low-skilled actors create their own variants.
  • Fast mutation: the ease of customization leads to countless versions, making signature-based defenses ineffective.
  • Dual-purpose use: Chaos can be used both as ransomware and as a wiper, making it appealing for political or destructive campaigns.
  • Irrecoverable data loss: early versions destroy files rather than encrypt them.

Once inside, Chaos affiliates use tools like AngryIPScanner, Nmap, or PowerShell to map networks and identify high-value targets for encryption or data exfiltration.

Once deployed, Chaos ransomware follows a typical ransomware kill chain. It ensures persistence by leveraging system startup scripts, such as init.d or systemd, to execute malicious files (e.g., /boot/System.img.config) on boot. Then it encrypts files and may exfiltrate sensitive data for double-extortion tactics. A ransom note is generated, demanding payment in cryptocurrency.

The malware may attempt to disable recovery features and security tools and delete shadow copies. Evasion techniques include code obfuscation, packing and encryption, fileless execution in some versions, and use of legitimate certificates in rare cases. Polymorphism is also important: multiple Chaos builds differ in structure and behavior, frustrating signature-based antivirus tools.

Chaos’s Execution Process and Technical Details

A sample of Chaos ransomware can be thoroughly studied in the safe environment of ANY.RUN’s Interactive Sandbox with its processes, artifacts, and the typical kill chain.

View Chaos in action.

Chaos Ransomware analysis in ANY.RUN Sandbox Chaos Ransomware sample in ANY.RUN's Interactive Sandbox

The execution chain of Chaos ransomware typically starts with phishing emails that carry malicious LNK shortcuts. Opening one of these files launches obfuscated PowerShell commands that retrieve a self-extracting archive from a remote server. The archive contains the Chaos ransomware executable together with loaders for additional malware. Once run, Chaos copies itself to a hidden location such as %AppData%\windowsdefender.exe and achieves persistence by placing a shortcut in the Windows Startup folder, guaranteeing execution after every reboot.

Chaos ransomware processes Chaos processes graph

After persistence is in place, Chaos spawns a new process to encrypt the victim’s files. It targets specific extensions to maximize damage and uses vssadmin, WMIC, wbadmin, and bcdedit to delete shadow copies and disable other backup mechanisms. By scanning the file system and encrypting valuable data, it effectively blocks the user’s access. Chaos ransomware also changes the desktop wallpaper on the infected system.

When encryption is complete, Chaos may contact its command-and-control (C2) server to upload encryption keys and system details. This channel also delivers ransom-payment instructions and, if the attackers choose, additional payloads or a decryption key once payment is confirmed. Finally, the victim receives a ransom note outlining the steps required to regain access to their data.

What are the best-known Chaos attacks?

  • “File Corruption” Campaigns (2021–2022). Many victims reported irrecoverable data loss instead of encryption. These attacks mostly hit small businesses and individuals. Chaos spread widely across forums, affecting users who downloaded pirated software or opened phishing emails.
  • Targeting Healthcare & Education Sectors (2022). Chaos ransomware builders were used in several attacks against small hospitals, private schools and colleges, municipal organizations. Systems mostly were rendered unusable even if ransoms were paid.
  • CHAOS 4.0 & 5.0 “Actual Encryption” Campaigns. More organized groups began using Chaos as an entry-level extortion tool, but these versions still lacked features of advanced ransomware (like data exfiltration). These versions switched from file destruction to proper AES encryption.

Chaos ransomware is not associated with famous victim names because:

  • It’s a ransomware builder, not a specific group’s tool.
  • It’s used by script kiddies, lone hackers, and non-sophisticated actors.
  • It targets low-hanging fruit, like poorly secured RDP servers or people downloading pirated software.
  • Most campaigns are uncoordinated, small-scale, and poorly operationalized.

Gathering Threat Intelligence on Chaos Ransomware

Threat Intelligence plays a key role in detecting and countering Chaos ransomware. IOCs must be gathered to enable monitoring and prevention: IP addresses and domains for C2 servers, file names and hashes.

Start with searching by the malware’s name via Threat Intelligence Lookup to find an assortment of fresh public analyses and harvest IOCs for tuning your security systems.

threatName:"Chaos"

Chaos ransomware public analyses Recent Chaos samples dissected in the sandbox

TI Lookup also provides sandbox reports containing behavioral analysis of Chaos samples. You'll be able to see how the use of vssadmin, bcdedit, and wbadmin to remove backups, overwriting of small files, unusual PowerShell or script activities trigger detection of Chaos variants.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Chaos ransomware is a multifaceted threat that combines ransomware, RAT, and DDoS capabilities. It is a significant risk to diverse industries, particularly those with unpatched systems or sensitive data. Its ability to infiltrate networks via phishing, exploits, and fake updates, coupled with advanced evasion techniques like port-hopping and binary obfuscation, requires robust detection and response strategies.

By leveraging threat intelligence, anomaly-based detection, and proactive countermeasures like Zero Trust and chaos engineering, organizations can mitigate Chaos’s impact.

Employ Threat Intelligence Lookup to counter Chaos: start with 50 test requests.

HAVE A LOOK AT

Latrodectus screenshot
Latrodectus
latrodectus
Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device.
Read More
StrelaStealer screenshot
StrelaStealer
strela
StrelaStealer is a malware that targets email clients to steal login credentials, sending them back to the attacker’s command-and-control server. Since its emergence in 2022, it has been involved in numerous large-scale email campaigns, primarily affecting organizations in the EU and U.S. The malware’s tactics continue to evolve, with attackers frequently changing attachment file formats and updating the DLL payload to evade detection.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More
Play Ransomware screenshot
Play aka PlayCrypt ransomware group has been successfully targeting corporations, municipal entities, and infrastruction all over the world for about three years. It infiltrates networks via software vulnerabilities, phishing links and compromised websites. The ransomware abuses Windows system services to evade detection and maintain persistence. Play encrypts user files and steals sensitive data while demanding a ransom.
Read More
X-Files screenshot
X-Files
xfiles
X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More