SYMBOLCOMMON_NAMEaka. SYNONYMS
win.mespinoza (Back to overview)

Mespinoza

aka: pysa
VTCollection    

Mespinosa is a ransomware which encrypts file using an asymmetric encryption and adds .pysa as file extension. According to dissectingmalware the extension "pysa" is probably derived from the Zanzibari Coin with the same name.

References
2022-06-23KasperskyDanila Nasonov, Natalya Shornikova, Nikita Nazarov, Vasily Davydov, Vladislav Burtsev
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs
Conti Hive BlackByte BlackCat Clop LockBit Mespinoza Ragnarok
2022-06-23KasperskyDanila Nasonov, Natalya Shornikova, Nikita Nazarov, Vasily Davydov, Vladislav Burtsev
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs (Download Form)
BlackByte BlackCat Clop Conti Hive LockBit Mespinoza RagnarLocker
2022-04-18SentinelOneJames Haughom
From the Front Lines | Peering into A PYSA Ransomware Attack
Chisel Chisel Cobalt Strike Mespinoza
2022-04-14PRODAFT Threat IntelligencePRODAFT
PYSA (Mespinoza) In-Depth Analysis
Mespinoza
2022-04-13PRODAFT Threat IntelligencePRODAFT
[PYSA] Ransomware Group In-Depth Analysis
Mespinoza
2022-03-23splunkShannon Davis
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed
Avaddon Babuk BlackMatter Conti DarkSide LockBit Maze Mespinoza REvil Ryuk
2022-03-16SymantecSymantec Threat Hunter Team
The Ransomware Threat Landscape: What to Expect in 2022
AvosLocker BlackCat BlackMatter Conti DarkSide DoppelPaymer Emotet Hive Karma Mespinoza Nemty Squirrelwaffle VegaLocker WastedLocker Yanluowang Zeppelin
2022-02-23splunkShannon Davis, SURGe
An Empirically Comparative Analysis of Ransomware Binaries
Avaddon Babuk BlackMatter Conti DarkSide LockBit Maze Mespinoza REvil Ryuk
2022-01-06Health Sector Cybersecurity Coordination Center (HC3)Health Sector Cybersecurity Coordination Center (HC3)
Mespinoza/GoldBurlap/CYBORG SPIDER
Mespinoza GOLD BURLAP
2021-11-29cybleCyble
Pysa Ransomware Under the Lens: A Deep-Dive Analysis
Mespinoza
2021-11-05Twitter (@inversecos)inversecos
TTPs used by Pysa Ransonmware group
Mespinoza MimiKatz
2021-09-27CybereasonAleksandar Milenkoski
Threat Analysis Report: Inside the Destructive PYSA Ransomware
Mespinoza
2021-09-09Lacework LabsLacework Labs
PYSA Ransomware Gang adds Linux Support
Mespinoza
2021-08-24Bleeping ComputerLawrence Abrams
Ransomware gang's script shows exactly the files they're after
Mespinoza
2021-07-15Palo Alto Networks Unit 42Alex Hinchliffe, Quinn Cooke, Robert Falcone
Mespinoza Ransomware Gang Calls Victims “Partners,” Attacks with Gasket, "MagicSocks" Tools
Gasket Mespinoza
2021-06-23BlackberryBlackBerry Research and Intelligence team
PYSA Loves ChaChi: a New GoLang RAT
ChaChi Mespinoza
2021-05-10DarkTracerDarkTracer
Intelligence Report on Ransomware Gangs on the DarkWeb: List of victim organizations attacked by ransomware gangs released on the DarkWeb
RansomEXX Avaddon Babuk Clop Conti Cuba DarkSide DoppelPaymer Egregor Hades LockBit Mailto Maze MedusaLocker Mespinoza Mount Locker Nefilim Nemty Pay2Key PwndLocker RagnarLocker Ragnarok RansomEXX REvil Sekhmet SunCrypt ThunderX
2021-05-06Cyborg SecurityBrandon Denker
Ransomware: Hunting for Inhibiting System Backup or Recovery
Avaddon Conti DarkSide LockBit Mailto Maze Mespinoza Nemty PwndLocker RagnarLocker RansomEXX REvil Ryuk Snatch ThunderX
2021-04-25Vulnerability.ch BlogCorsin Camichel
Ransomware and Data Leak Site Publication Time Analysis
Avaddon Babuk Clop Conti DarkSide DoppelPaymer Mespinoza Nefilim REvil
2021-03-16FBIFBI
Alert Number CP-000142-MW: Increase in PYSA Ransomware Targeting Education Institutions
Mespinoza
2021-02-23CrowdStrikeCrowdStrike
2021 Global Threat Report
RansomEXX Amadey Anchor Avaddon BazarBackdoor Clop Cobalt Strike Conti Cutwail DanaBot DarkSide DoppelPaymer Dridex Egregor Emotet Hakbit IcedID JSOutProx KerrDown LockBit Mailto Maze MedusaLocker Mespinoza Mount Locker NedDnLoader Nemty Pay2Key PlugX Pushdo PwndLocker PyXie QakBot Quasar RAT RagnarLocker Ragnarok RansomEXX REvil Ryuk Sekhmet ShadowPad SmokeLoader Snake SUNBURST SunCrypt TEARDROP TrickBot WastedLocker Winnti Zloader Evilnum OUTLAW SPIDER RIDDLE SPIDER SOLAR SPIDER VIKING SPIDER
2021-01-07Twitter (@campuscodi)Catalin Cimpanu
Tweet on London's Hackney Council attacked by Pysa/Mespinoza ransomware
Mespinoza
2021-01-01SecureworksSecureWorks
Threat Profile: GOLD BURLAP
Empire Downloader Mespinoza MimiKatz GOLD BURLAP
2020-11-23The DFIR ReportThe DFIR Report
PYSA/Mespinoza Ransomware
Empire Downloader Mespinoza
2020-11-16Intel 471Intel 471
Ransomware-as-a-service: The pandemic within a pandemic
Avaddon Clop Conti DoppelPaymer Egregor Hakbit Mailto Maze Mespinoza RagnarLocker REvil Ryuk SunCrypt ThunderX
2020-10-23HornetsecurityHornetsecurity Security Lab
Leakware-Ransomware-Hybrid Attacks
Avaddon Clop Conti DarkSide DoppelPaymer Mailto Maze Mespinoza Nefilim RagnarLocker REvil Sekhmet SunCrypt
2020-08-25KELAVictoria Kivilevich
How Ransomware Gangs Find New Monetization Schemes and Evolve in Marketing
Avaddon Clop DarkSide DoppelPaymer Mailto Maze MedusaLocker Mespinoza Nefilim RagnarLocker REvil Sekhmet
2020-03-19ZDNetCatalin Cimpanu
France warns of new ransomware gang targeting local governments
Mespinoza
2020-03-18CERT-FRCERT-FR
Rapport Menaces et Incidents du CERT-FR: Attaques par le rançongiciel Mespinoza/Pysa
Mespinoza
2019-12-14Dissecting MalwareMarius Genheimer
Another one for the collection - Mespinoza (Pysa) Ransomware
Mespinoza
2019-10-11ID RansomwareAndrew Ivanov
Mespinoza Ransomware
Mespinoza
Yara Rules
[TLP:WHITE] win_mespinoza_auto (20251219 | Detects win.mespinoza.)
rule win_mespinoza_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2026-01-05"
        version = "1"
        description = "Detects win.mespinoza."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.mespinoza"
        malpedia_rule_date = "20260105"
        malpedia_hash = "19b79e7cab4eaf532122e5b45a77dd8f6bb5cc79"
        malpedia_version = "20251219"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6a02 6a00 68???????? 6802000080 ff15???????? 8b15???????? }
            // n = 6, score = 200
            //   6a02                 | push                2
            //   6a00                 | push                0
            //   68????????           |                     
            //   6802000080           | push                0x80000002
            //   ff15????????         |                     
            //   8b15????????         |                     

        $sequence_1 = { 894de4 399860554700 0f84ea000000 41 83c030 894de4 3df0000000 }
            // n = 7, score = 200
            //   894de4               | mov                 dword ptr [ebp - 0x1c], ecx
            //   399860554700         | cmp                 dword ptr [eax + 0x475560], ebx
            //   0f84ea000000         | je                  0xf0
            //   41                   | inc                 ecx
            //   83c030               | add                 eax, 0x30
            //   894de4               | mov                 dword ptr [ebp - 0x1c], ecx
            //   3df0000000           | cmp                 eax, 0xf0

        $sequence_2 = { 6a00 ff5014 c20800 55 8bec 83c1f8 }
            // n = 6, score = 200
            //   6a00                 | push                0
            //   ff5014               | call                dword ptr [eax + 0x14]
            //   c20800               | ret                 8
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   83c1f8               | add                 ecx, -8

        $sequence_3 = { 40 8945d4 8bd8 0f1f00 ff75e0 8b17 }
            // n = 6, score = 200
            //   40                   | inc                 eax
            //   8945d4               | mov                 dword ptr [ebp - 0x2c], eax
            //   8bd8                 | mov                 ebx, eax
            //   0f1f00               | nop                 dword ptr [eax]
            //   ff75e0               | push                dword ptr [ebp - 0x20]
            //   8b17                 | mov                 edx, dword ptr [edi]

        $sequence_4 = { e8???????? 8d8d98efffff e8???????? 8b4df4 }
            // n = 4, score = 200
            //   e8????????           |                     
            //   8d8d98efffff         | lea                 ecx, [ebp - 0x1068]
            //   e8????????           |                     
            //   8b4df4               | mov                 ecx, dword ptr [ebp - 0xc]

        $sequence_5 = { 897de4 33db 895dfc 895dd4 81fb80000000 7d4d 8b049d00b04700 }
            // n = 7, score = 200
            //   897de4               | mov                 dword ptr [ebp - 0x1c], edi
            //   33db                 | xor                 ebx, ebx
            //   895dfc               | mov                 dword ptr [ebp - 4], ebx
            //   895dd4               | mov                 dword ptr [ebp - 0x2c], ebx
            //   81fb80000000         | cmp                 ebx, 0x80
            //   7d4d                 | jge                 0x4f
            //   8b049d00b04700       | mov                 eax, dword ptr [ebx*4 + 0x47b000]

        $sequence_6 = { 3347fc 0be8 83ea01 75f0 8b5c2420 896c2410 eb08 }
            // n = 7, score = 200
            //   3347fc               | xor                 eax, dword ptr [edi - 4]
            //   0be8                 | or                  ebp, eax
            //   83ea01               | sub                 edx, 1
            //   75f0                 | jne                 0xfffffff2
            //   8b5c2420             | mov                 ebx, dword ptr [esp + 0x20]
            //   896c2410             | mov                 dword ptr [esp + 0x10], ebp
            //   eb08                 | jmp                 0xa

        $sequence_7 = { c6430900 83630c00 c703???????? 8a00 884310 eb02 33db }
            // n = 7, score = 200
            //   c6430900             | mov                 byte ptr [ebx + 9], 0
            //   83630c00             | and                 dword ptr [ebx + 0xc], 0
            //   c703????????         |                     
            //   8a00                 | mov                 al, byte ptr [eax]
            //   884310               | mov                 byte ptr [ebx + 0x10], al
            //   eb02                 | jmp                 4
            //   33db                 | xor                 ebx, ebx

        $sequence_8 = { 0f57c0 c745fc00000000 660fd64604 6aff 8d4e10 c706???????? c7460c04000000 }
            // n = 7, score = 200
            //   0f57c0               | xorps               xmm0, xmm0
            //   c745fc00000000       | mov                 dword ptr [ebp - 4], 0
            //   660fd64604           | movq                qword ptr [esi + 4], xmm0
            //   6aff                 | push                -1
            //   8d4e10               | lea                 ecx, [esi + 0x10]
            //   c706????????         |                     
            //   c7460c04000000       | mov                 dword ptr [esi + 0xc], 4

        $sequence_9 = { e8???????? 8bd8 33c9 8bc6 895dc8 f7e7 }
            // n = 6, score = 200
            //   e8????????           |                     
            //   8bd8                 | mov                 ebx, eax
            //   33c9                 | xor                 ecx, ecx
            //   8bc6                 | mov                 eax, esi
            //   895dc8               | mov                 dword ptr [ebp - 0x38], ebx
            //   f7e7                 | mul                 edi

    condition:
        7 of them and filesize < 1091584
}
Download all Yara Rules