New Gunra Ransomware Strikes Windows PCs, Encrypts Files, and Wipes Shadow Copies

A recently identified ransomware variant, dubbed Gunra, has surfaced as a major threat in the ransomware landscape, targeting Windows systems.

Discovered in April 2025, Gunra has quickly drawn attention due to its technical lineage and aggressive operational techniques, echoing those of the notorious Conti ransomware group.

AhnLab’s Threat Intelligence Platform (TIP), which tracks ransomware activity across dark web forums and marketplaces, has spotlighted Gunra’s rise among a new surge of Dedicated Leak Sites (DLS) between February and June 2025, highlighting an alarming uptick in ransomware-as-a-service activity.

Gunra’s technical footprint indicates a strong evolutionary link to Conti. Conti, historically based in Russia and infamous for its large-scale operations since 2020, saw its internal documents and source code leaked in early 2022 by a Ukrainian affiliate after the group publicly supported the Russian government.

That leak spawned several high-profile ransomware strains including Black Basta and Royal and Gunra now joins their ranks, distinguished by technical enhancements and a more intense pressure campaign on its victims.

Multi-Threaded Encryption

Upon execution, Gunra ransomware creates multiple threads equal to the number of logical cores in the infected machine to maximize encryption speed and efficiency. Each thread utilizes a hardcoded RSA public key embedded in the binary.

Gunra Ransomware
Creating a thread

This key is used to generate session-specific RSA keys, which subsequently derive ChaCha20 symmetric encryption keys.

The ChaCha20 keys then drive the encryption routine, rapidly scrambling targeted files across user directories.

Gunra targets a wide array of user data but strategically avoids critical system directories and files vital for operating system stability.

It excludes folders such as Windows, Boot, System Volume Information, and Trend Micro from infection, as well as file extensions like .exe, .dll, .lnk, and even its own encrypted extension, .ENCRT.

The ransomware also excludes certain files, including its ransom note (“R3ADM3.txt”) and a log file reminiscent of Conti (“CONTI_LOG.txt”), from encryption.

Gunra Ransomware
Ransom note

After finishing the file encryption process, Gunra initiates a destructive command sequence using cmd.exe to systematically delete Windows Volume Shadow Copies.

This step, leveraging WMIC, is intended to thwart local restoration efforts by erasing system backups:

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where “ID={GUID of the shadowcopy}” delete

Victims are then confronted with a ransom note (R3ADM3.txt), which instructs them to visit a designated threat actor-controlled website for payment instructions and data recovery steps.

Of note is Gunra’s psychological pressure tactic: victims are warned they must initiate negotiations within five days, adding urgency and stress to the extortion process.

Targeting Patterns

AhnLab’s analysis notes that if a target drive is the system volume (C:$$, the ransomware confines its operations to the C:\Users folder, narrowing the impact to user data rather than the entire disk.

This approach helps maintain system operability post-encryption, facilitating communication for ransom payment.

Given Gunra’s rapidly evolving threat profile and the broader trend of proliferating DLS ransomware, organizations are advised to maintain regular, offline, or geographically segmented backups; restrict access to backup storage; and routinely rehearse recovery operations.

Security updates, endpoint protection, and vigilant email and network hygiene remain vital. Special emphasis is placed on storing critical data and backups entirely offsite and segregated from operational networks to maximize defenses against ransomware incursions.

As ransomware tactics and operations continue to advance, the emergence of Gunra signals an urgent need for organizations to redouble their incident preparedness, focusing not only on backup creation but also on resilient, tested recovery strategies.

Indicators of Compromise (IOC)

MD5 HashDescription
0339269cef32f7af77ce9700ce7bf2e2Gunra sample
3178501218c7edaef82b73ae83cb4d91Gunra sample
7dd26568049fac1b87f676ecfaac9ba0Gunra sample
92e11df03725e29d963d44508d41a8ddGunra sample
9a7c0adedc4c68760e49274700218507Gunra sample

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here