OracleData Active
Ransomware group first observed in 2021. Uses TrickBot for deployment.0
Total Victims
2021-01-01
First Seen
2026-03-20
Last Seen
0
Known TTPs
41.9d
Avg Delay
0
Negotiations
ONION URLS
lvfvga3pybiuzkrzy4dlczj2kvndu52m6kkdddvjegchpnwlsia632ma.onion
TOOLS
TrickBot
QBot
WinSCP
ScreenConnect
Cobalt Strike
FILE EXTENSIONS
.doom
ACTIVITY TIMELINE
TOP SECTORS
TOP COUNTRIES
ACTIVITY HEATMAP
| Date | Victim Name | Country | Sector | Status |
|---|---|---|---|---|
| No victims recorded | ||||
No TTPs data
OracleData_rule_1
Elastic Security
rule OracleData_ransomware_1 {
meta:
description = "Detects OracleData ransomware"
author = "RansomwareMonitor"
date = "2026-03-06"
hash = "6213d92ade9221d221c3b27d8c6d2104fefc33cae7021cbb3796fc9594555195"
strings:
$s0 = "README" nocase
$h1 = { B6 27 C1 26 1B DF DC 18 E8 C }
$r2 = /[A-Za-z0-9]{56}\.onion/
condition:
uint16(0) == 0x5A4D and
filesize < 5MB and
3 of them
}
OracleData_rule_2
Florian Roth
rule OracleData_ransomware_2 {
meta:
description = "Detects OracleData ransomware"
author = "RansomwareMonitor"
date = "2026-03-06"
hash = "0bd3681d2762482db1eee99d20fab70ca503593431a48226738d1a3187171671"
strings:
$r0 = /[13][a-km-zA-HJ-NP-Z1-9]{25,34}/
$r1 = /[A-Za-z0-9]{56}\.onion/
$s2 = "PAYMENT" nocase
$s3 = "PAYMENT" nocase
$h4 = { B2 CA 01 F7 D6 2F 73 8A 84 75 A6 42 41 DD DB 2F }
$s5 = "BITCOIN" nocase
$h6 = { 7D CC 82 85 12 45 52 38 86 09 5F CA B7 96 E4 18 5B }
$s7 = "BITCOIN" nocase
condition:
uint16(0) == 0x5A4D and
filesize < 5MB and
2 of them
}
OracleData_rule_3
RansomwareMonitor
rule OracleData_ransomware_3 {
meta:
description = "Detects OracleData ransomware"
author = "RansomwareMonitor"
date = "2026-03-06"
hash = "e0e66c23f45f05e17508610ca607af120f4dab438c5ee42e25fe7b3365af66fc"
strings:
$s0 = ".onion" nocase
$s1 = "README" nocase
$h2 = { 10 30 14 D5 BC 4D ED 6E F7 2C CF D1 88 7D 9F 60 4A 59 FE 55 4D }
condition:
uint16(0) == 0x5A4D and
filesize < 5MB and
2 of them
}
No ransom notes