LevelBlue to Acquire Trustwave, Becoming Largest Pure-Play MSSP. Learn More

LevelBlue to Acquire Trustwave, Becoming Largest Pure-Play MSSP. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Dire Wolf Strikes: New Ransomware Group Targeting Global Sectors

Dire Wolf is a newly emerged ransomware group first observed in May 2025 and Trustwave SpiderLabs recently uncovered a Dire Wolf ransomware sample that revealed for the first time key details about how the ransomware operates.

Since its discovery, Dire Wolf ransomware group has launched a series of targeted attacks across multiple sectors and regions with an emphasis on manufacturing and technology sectors.

Using a double extortion tactic, Dire Wolf not only encrypts the victim’s files but also threatens to publish stolen sensitive files unless a ransom is paid, escalating the threat beyond data loss to reputational damage. In this blog we delve into the group target preferences and present the very first analysis of the ransomware binary used to encrypt victim computers.

As of this writing, 16 victims have been publicly listed on the group’s leak site, spread across 11 nations. The US and Thailand have reported the highest number of attacks, followed by Taiwan.

Figure 1. Top Countries targeted by Dire Wolf
Figure 1. Top Countries targeted by Dire Wolf

 

Among the published victims, the top targeted sectors are manufacturing and technology sectors.

Figure 2. Top Sectors targeted by Dire Wolf
Figure 2. Top Sectors targeted by Dire Wolf

As Dire Wolf’s victim count continues to rise, understanding the tools and techniques behind its attacks becomes increasingly important. A recent discovery by Trustwave SpiderLabs uncovered a Dire Wolf ransomware sample revealing key details about how the ransomware operates.

 

Analysis

The Dire Wolf ransomware sample was acquired through Trustwave’s Virustotal Hunting, and was noted to be initially packed using UPX, a common method used by threat actors to obfuscate malware and hinder basic static analysis.

Figure 3. File details shown in Detect It Easy
Figure 3. File details shown in Detect It Easy

Once unpacked, analysis of the binary showed that it was written in Golang. Golang is a cross-platform programming language that has become increasingly popular among cybercriminals because of its portability and ability to run across various operating systems with minimal modification. Some antivirus vendors still struggle to detect malware written in Golang, which is another reason for its growing popularity amongst threat actors.

Figure 4. Unpacked Code shown in HIEW
Figure 4. Unpacked Code shown in HIEW

Upon inspection, The Dire Wolf cryptor supports the following command line arguments:

Parameter

Description

-h, -help

Display usage

-d <path>

Encrypts specific path

 

When executed, the ransomware first checks if the system has already been encrypted. It does this by looking for a file named “runfinish.exe” in the C drive, an empty file marker dropped after encryption. It also checks for the presence of mutex “Global\direwolfAppMutex” to ensure only a single instance runs at a time.

Figure 5. Checking for runfinish.exe and Mutex
Figure 5. Checking for runfinish.exe and Mutex

If either condition is met, the ransomware deletes itself and terminates execution using the following command: 

cmd /C timeout /T 3 & del /f /q <path_to_self> & exit

Figure 6. Function containing the initial checks and self-deletion
Figure 6. Function containing the initial checks and self-deletion

After passing the initial checks, ensuring that the machine hasn’t been already encrypted and that no Dire Wolf instance is running, the ransomware proceeds to disable event logging and terminate specific processes and services that may hinder its execution.

Figure 7. Series of functions executed to disable event logs and terminates processes and services
Figure 7. Series of functions executed to disable event logs and terminates processes and services

 

Below is a breakdown of each function involved in this stage of the attack:

 

Disable Windows Event Logs Function

This function is designed to continuously disable Windows system logging by terminating the “eventlog” process. It does this by executing a Powershell command to retrieve the Process ID of the “eventlog” using the following command: 

Get-WmiObject -Class win32_service -Filter "name = 'eventlog'" | select -exp ProcessId

Figure 8. Function to disable Windows eventlog
Figure 8. Function to disable Windows eventlog

This command queries Windows Management Instrumentation (WMI) for the “eventlog” and extracts its PID. After getting the PID, it will run the following command to terminate the process

cmd /c start taskkill /f /pid <PID>

Figure 9. Process termination via taskkill
Figure 9. Process termination via taskkill

 

Terminating Services Function

This function attempts to stop and disable a hardcoded list of 75 services. It first tries to stop each service using ControlService with control code 1 (SERVICE_CONTROL_STOP). If that fails, it executes “sc stop <service name>” command to forcibly terminate the service.

Figure 10. Function to stop service via ControlService
Figure 10. Function to stop service via ControlService

Once it confirms the service is stopped, it disables the service using the following command: 

sc config <service-name> start= disabled

Below is the list of hardcoded services the ransomware attempts to terminate, including those used by antivirus solutions such as Sophos, Symantec, and Qihoo 360.

AcrSch2Svc

mepocs

SQLPBENGINE

BackExecRPCService

MsDtsServer150

SQLSERVERAGENT

backup

MSExchange

SQLServerDistributedReplayClient

BackupExecAgentAccelerator

msftesql-Exchange

SQLServerDistributedReplayController

BackupExecAgentBrowser

msmdsrv

SQLTELEMETRY

BackupExecDiveciMediaService

MSSQL

SQLWriter

BackupExecJobEngine

MSSQLFDLauncher

SSASTELEMETRY

BackupExecManagementService

MSSQLLaunchpad

SSISScaleOutMaster150

BackupExecRPCService

MSSQLSERVER

SSISScaleOutWorker150

BackupExecVSSProvider

MSSQLServerOLAPService

SSISTELEMETRY150

bedbg

PDVFSService

stc_raw_agent

CAARCUpdateSvc

QBCFMonitorService

tomcat6

CASAD2DWebSvc

QBFCService

veeam

ccEvtMgr

QBIDPService

VeeamDeploymentService

ccSetMgr

RTVscan

VeeamNFSSvc

Culserver

SavRoam

VeeamTransportSvc

dbeng8

sophos

vmware-converter

DefWatch

sql

vmware-usbarbitator64

GxBlr

sqladhlp

VSNAPVSS

GxCIMgr

SQLADHLP

vss

GxCVD

sqlagent

WSBExchange

GxFWD

SQLAgent

wuauserv

GxVss

SQLAgent$SHAREPOINT

YooBackup

Intuit.QuickBooks.FCS

SQLBrowser

YooIT

memtas

SQLPBDMS

zhudongfangyu

 

Dedicated to hunting and eradicating the world’s most challenging threats.

SpiderLabs

 

Terminate Process Function

This function attempts to terminate a hardcoded list of 59 applications using the following command:

taskkill /F /IM <process_name>

The loop runs continuously to ensure these processes remain terminated.

Figure 11. Process Termination via taskkill
Figure 11. Process Termination via taskkill

Below is the list of applications the ransomware attempts to terminate including processes related to database software, office tools and anti-virus software.

agntsvc.exe

mspub.exe

sqlservr.exe

Culture.exe

mydesktopqos.exe

sqlwriter.exe

dbeng50.exe

mydesktopservice.exe

steam.exe

dbsnmp.exe

notepad++.exe

supervise.exe

dbsrv12.exe

notepad.exe

synctime.exe

Defwatch.exe

ocautoupds.exe

tbirdconfig.exe

encsvc.exe

ocomm.exe

thebat.exe

excel.exe

ocssd.exe

thunderbird.exe

firefox.exe

onedrive.exe

tomcat6.exe

httpd.exe

onenote.exe

visio.exe

infopath.exe

oracle.exe

vss.exe

isqlplussvc.exe

outlook.exe

vxmon.exe

memtas.exe

powerpnt.exe

WinSAT.exe

msaccess.exe

RAgui.exe

winword.exe

MSExchangeIS.exe

sqbcoreservice.exe

wordpad.exe

MSExchangeMailboxAssistants.exe

sql.exe

wrapper.exe

MSExchangeRepl.exe

sqlagent.exe

wsa_service.exe

MSExchangeRPC.exe

sqlbrowser.exe

wxServerView.exe

MSExchangeServiceHost.exe

sqlmangr.exe

xfssvccon.exe

MSExchangeTransport.exe

Sqlservr.exe

 

 

Delete Backups, Recovery and Logs Function

This function is responsible for removing system recovery options by executing a series of Windows commands, as shown below:

vssadmin delete shadows /all /quiet

wmic shadowcopy delete /nointeractive

wbadmin stop job -quiet

wbadmin disable backup -quiet

wbadmin delete backup -keepVersions:0 -quiet

wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:0 -quiet

wbadmin delete catalog -quiet

bcdedit /set {default} recoveryenabled No

bcdedit /set {default} bootstatuspolicy ignoreallfailures

wevtutil cl Application

wevtutil cl system

wevtutil cl security

wevtutil cl setup

These commands are used to:

- Deletion of shadow copies via vssadmin and wmic

- Disable and delete Windows backup via wbadmin

- Disable Recovery and Boot Error prompts via bcedit

- Clears windows event logs via wevtutil

 

Encryption

The ransomware uses combination of Curve25519 and ChaCha20 algorithms for its encryption and appends the “.direwolf” extension on the encrypted files. The ransomware encrypts all files found on the machine except for files with the following extensions:

.exe

.dll

.sys

.drv

.bin

.tmp

.iso

.img

.direwolf

It then drops the following ransom note in figure 12. Based on its contents, the encryptor appears to be tailored to a specific victim, as it contains a hardcoded room ID and login access unique to the targeted organization. The note provides login details to their live chat room, including a roomID, username and password, allowing the victim to contact the Threat Actors directly for ransom negotiations. It also contains a link to a sample document uploaded to gofile.io, as proof of data exfiltration. This strongly suggests that Dire Wolf conducts targeted attacks, utilizing tailored encryptors and personalized negotiation channels specific to their victims.

Figure 12. Dire Wolf ransom note
Figure 12. Dire Wolf ransom note

After encryption, it will then delete itself and reboot the machine.

 

Dire Wolf Data Leak site

As of this writing, 15 victims are listed on their data leak site, including five whose exfiltrated files are set to be uploaded by the end of June. During investigation, we observed that the threat actors initially publish sample data and a list of exfiltrated files, then give the victims around one month to pay before releasing all the stolen data. The ransom demand from one of the victims was approximately $500,000.

Figure 13. Victims published on Dire Wolf Data Leak Site
Figure 13. Victims published on Dire Wolf Data Leak Site

On their “About” page, the Dire Wolf group claims to be financially motivated and does not hold any political stance.

Figure 14. About Us Note on Dire Wolf Data Leak Site
Figure 14. About Us Note on Dire Wolf Data Leak Site

They also provided a qTox ID “B344BECDC01A1282F69CB82979F40439E15E1FD1EF1FE9748EE467F5869E2148E6F1E55959E2” for communication and claimed to be based in New York, although the claimed location is not credible.

Figure 15. gTox ID and Alleged Location Visible on Dire Wolf Data Leak Site
Figure 15. gTox ID and Alleged Location Visible on Dire Wolf Data Leak Site

Although no initial access, reconnaissance or lateral movement techniques used by Dire Wolf are known at this point, organizations shall follow good security practices as well as enable monitoring for the techniques revealed in this analysis.

Trustwave ISA and Trustwave SpiderLabs provide a set of detection rules capturing impact and defense evasion techniques listed in this blog as well as other common methods used by ransomware operators. Here are some of the procedures that shall be detected by these use cases:

vssadmin delete shadows /all /quiet

wmic shadowcopy delete /nointeractive

wbadmin disable backup -quiet

wbadmin delete backup -keepVersions:0 -quiet

wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:0 -quiet

wbadmin delete catalog -quiet

bcdedit /set {default} recoveryenabled No

bcdedit /set {default} bootstatuspolicy ignoreallfailures

wevtutil cl Application

wevtutil cl system

wevtutil cl security

wevtutil cl setup

 

Additionally, Trustwave's Advanced Continual Threat Hunt (ACTH) with a new patent-pending methodology enables Trustwave to conduct threat hunts for potential malware and malicious activities.

 

IOCs:

Filename

Type

File Hash

data345.exe

Win64 EXE

MD5:

A71dbf2e20c04da134f8be86ca93a619

SHA-1:

Ed7c9fbd42605c790660df86b7ec325490f6d827

SHA-256:

8fdee53152ec985ffeeeda3d7a85852eb5c9902d2d480449421b4939b1904aad

data345.exe (unpacked)

Win64 EXE

MD5:

aa62b3905be9b49551a07bc16eaad2ff

SHA-1:

4a5852e9f9e20b243d8430b229e41b92949e4d69

SHA-256:

27d90611f005db3a25a4211cf8f69fb46097c6c374905d7207b30e87d296e1b3

 

QTox ID

B344BECDC01A1282F69CB82979F40439E15E1FD1EF1FE9748EE467F5869E2148E6F1E55959E2

 

Data Leak Site

hxxp://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd[.]onion

About the Author

Nathaniel Morales is part of the Managed Threat Research team at SpiderLabs, Trustwave, where he specializes in threat hunting and malware analysis. He focuses on identifying emerging threats and developing detection use cases to stay ahead of evolving cyber adversaries. Follow Nathaniel on LinkedIn.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo