PowerShell Ransomware Uses GitHub for Distribution: A New Threat Identified

The SonicWall Capture Labs threat research team has identified a new PowerShell-based ransomware variant that uses GitHub for its distribution. The malware leverages the raw.githubusercontent[.]com domain to host malicious files, including executables like decryptor.exe.


The ransomware is initially delivered via an archive file containing a malicious LNK file, likely sent as an email attachment. This LNK file, disguised as a Notepad document, points to powershell.exe and executes a PowerShell script hosted on GitHub, which contains the ransomware's core functionality.
The script targets user directories such as Desktop, Downloads, and Documents, encrypting files with a randomly generated AES key, which is then encrypted with a predefined RSA public key. It avoids encrypting critical file types to prevent system instability, appending the .ENCRYPT extension to encrypted files.


After encryption, the ransomware downloads a file named decryptor.exe from GitHub and creates a decoy text file to distract the user. It also sets up a scheduled task for persistence, executing the PowerShell script until decryptor.exe is dropped.
Victims receive a ransom note demanding $500 in Monero (XMR) for the decryption key, but paying the ransom is not recommended as recovery is not guaranteed. This threat is detected by SonicWall Capture ATP with RTDMI™.
"NPAV recommends home users and organizations to maintain strong, up-to-date cybersecurity measures. Install NPAV on your desktop, laptop, and mobile devices to ensure world-class protection against fraud, malware, and ransomware attacks.
Choose NPAV and be a part of our mission to make the digital world safer for everyone."
- Other (43)
- Ransomware (154)
- Events and News (27)
- Features (45)
- Security (487)
- Tips (79)
- Google (30)
- Achievements (11)
- Products (36)
- Activation (7)
- Dealers (1)
- Bank Phishing (53)
- Malware Alerts (235)
- Cyber Attack (303)
- Data Backup (13)
- Data Breach (132)
- Phishing (165)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (71)
- Android Security (78)
- Knoweldgebase (38)
- Botnet (17)
- Updates (4)
- Alert (71)
- Hacking (71)
- Social Media (8)
- vulnerability (76)
- Hacker (38)
- Spyware (12)
- Windows (8)
- Microsoft (26)
- Uber (1)
- YouTube (1)
- Trojan (5)
- Website hacks (10)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (8)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (10)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (9)
- IoT Security (2)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (6)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (52)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (41)