
ESXiArgs: The Consequences of Infection
ESXiArgs is a ransomware strain that has been reported to have infected over 3000 hosts in several countries, including France, Germany, the Netherlands, the U.K., and Ukraine. The ransomware is suspected to be based on the leaked Babuk ransomware code and is believed to be targeting end-of-life ESXi servers or ESXi servers that do not have the available ESXi software patches applied.
Domains | Source | Last Update |
---|---|---|
httpnevcorps5cvivjf6i2gm4uia7cxng5ploqny2rgrinctazjlnqr2yiyd.onion | SOCRadar | 2023-02-17 |
nevcorps5cvivjf6i2gm4uia7cxng5ploqny2rgrinctazjlnqr2yiyd.onion | SOCRadar | 2023-02-17 |
aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion | SOCRadar | 2023-02-15 |
danimos.com | SOCRadar | 2023-02-15 |
gerhiles.com | SOCRadar | 2023-02-15 |
zedorocop.com | SOCRadar | 2023-02-15 |
northwave-security.com | SOCRadar | 2023-02-15 |
bruteratel.com | SOCRadar | 2023-02-15 |
Hashes | Source | Last Update |
---|---|---|
1396ab93e9104faaf138ac64211471ba | SOCRadar | 2023-02-17 |
709ba88e758454f097959c3e62997000 | SOCRadar | 2023-02-17 |
fb5dcf0b880b57b10a2093f164f2ed27 | SOCRadar | 2023-02-17 |
f1f569c6e4f961007f7411fca131bbe0 | SOCRadar | 2023-02-17 |
5a9448964178a7ad3e8ac509c06762e418280c864c1d3c2c4230422df2c66722 | SOCRadar | 2023-02-17 |
99549bcea63af5f81b01decf427519af | SOCRadar | 2023-02-17 |
7f0ea6e4d18ac0c1051e7366c367b01c08e75afd17fc20df301c5b95373eb34f | SOCRadar | 2023-02-17 |
17eccc7e2ce38dafd41d68861da636d7c05290b95d4fd75ec87b819094702cf6 | SOCRadar | 2023-02-15 |
bdb4f2b6e44e97f989f3141bc1a35d5fed9e1a6721e851a72a5fcc05f3b31494 | SOCRadar | 2023-02-15 |
4f7d97bf4803bf1b15c5bec85af3dc8b7619fe5cfe019f760c9a25b1650f4b7c | SOCRadar | 2023-02-15 |
62cb24967c6ce18d35d2a23ebed4217889d796cf7799d9075c1aa7752b8d3967 | SOCRadar | 2023-02-15 |
203d2807df6ef531efbec7bfd109986de3e23df64c01ea4e337cbe5ba675248b | SOCRadar | 2023-02-15 |
14d53c3d675458863ee2b336a4203f680932181ff5db99bb2f1640ffd44947b5 | SOCRadar | 2023-02-15 |
9fce9ee85516533bae34fc1184a7cf31fa9f2c7889b13774f83d1df561708833 | SOCRadar | 2023-02-15 |
0165ff14fa840c0074a7ee5108858f8d | SOCRadar | 2023-02-15 |
2bee3f716b80273db9639376a296cf19cdba0f1a | SOCRadar | 2023-02-15 |
69d12572520122cb9bddc2d6793d97ab | SOCRadar | 2023-02-15 |
7a39324822941014609f0fd7d05f1adbbccc3f36d79103e2589251680f3b6c63 | SOCRadar | 2023-02-15 |
f78fdb894624b1388c1c3ec1600273d12d721da5171151d6606a625acf36ac30 | SOCRadar | 2023-02-15 |
319704f093b71286985716d87c6fb20d6ddc334be6f1ccc042de8c73f7f5df36 | SOCRadar | 2023-02-15 |
e2eb9029fd993a9ab386beb7ca4fa21a1871dc0c7568eb802cac1ea3c53cad8b | SOCRadar | 2023-02-15 |
4fd4fdedb11b76a24fba289e0b3a8ed07261f98d279932420c7af779663605f8 | SOCRadar | 2023-02-15 |
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef | SOCRadar | 2023-02-15 |
7c79cd208b8d052bbc957d70b21dc4f548f2f48e2696005b99ff4ce5cf41f5d1 | SOCRadar | 2023-02-15 |
90e9bd336e51c88002e5e9a109c5fb0e57d2c90cd54d4bc7480b69fa302beb73 | SOCRadar | 2023-02-15 |
ff4fe3c3f2f6a65f43943b3326dd47686bc48c53a7c6714602c1b547a8e8b538 | SOCRadar | 2023-02-15 |
7385cc993ec169ad06a4e367b5ad65b9d6a231fe385d11fe8c3757d557932e8c | SOCRadar | 2023-02-15 |
11b1b2375d9d840912cfd1f0d0d04d93ed0cddb0ae4ddb550a5b62cd044d6b66 | SOCRadar | 2023-02-15 |
a0a87db436f4dd580f730d7cbe7df9aa7d94a243aab1e600f01cde573c8d10b8 | SOCRadar | 2023-02-15 |
c4875bd0683467c1e5d44f80b1d5abf6ac9b6f5bf5b6750a1e653416a68ed006 | SOCRadar | 2023-02-15 |
4b3eb841b765c4aeb6b273e42a60e1f8ba3d3d94c613a27cd6446a354c2b7285 | SOCRadar | 2023-02-15 |
b363e038a6d6326e07a02e7ff99d82852f8ec2d2 | SOCRadar | 2023-02-15 |
4d7e2b3eeb7958a60f9ac7a572cb2c560504f11dbd656bcfd068685b69214508 | SOCRadar | 2023-02-15 |
474b800fa4f8c2638607b012029cb134b58534e7817fbf3658c9c1d8c78204fa | SOCRadar | 2023-02-15 |
32f17040ddaf3477008d844c8eb98410 | SOCRadar | 2023-02-15 |
10c3b6b03a9bf105d264a8e7f30dcab0a6c59a414529b0af0a6bd9f1d2984459 | SOCRadar | 2023-02-15 |
3b5ff11fe11246c91d29cde511a22636524e91e29842dde6327fe92484e08f47 | SOCRadar | 2023-02-15 |
ae4b7284a9538c66432f02097c3de14e2253d16b6602c4694753468bc14d7d28 | SOCRadar | 2023-02-15 |
99692f5a1ca26b896d8c3220c42db7adc3007837a9b0d12d60d888f01f92fbbf | SOCRadar | 2023-02-15 |
5b8bf891808be44f24156cf5430730e610c0df6eaaa4b062623a7a675d234b62 | SOCRadar | 2023-02-15 |
e8f5fa12faea9430645853fbb24ce46a5a62cb906168dd17b62d865ddfe201e3 | SOCRadar | 2023-02-15 |
2cf56e6c050d0c9d8ada6cdb79a8ed2b8bbc25cd7d33ccc79aeedb31b5ad00df | SOCRadar | 2023-02-15 |
cd5b4bd824bad0be78e4cdf6d7fe8a950bd63f294713b8cb49de887d8a8410bc | SOCRadar | 2023-02-15 |
b64acb7dcc968b9a3a4909e3fddc2e116408c50079bba7678e85fee82995b0f4 | SOCRadar | 2023-02-15 |
d4dd79c97b091dd31791456c56d727eb0b30af9c0172dd221556d28495b8a50f | SOCRadar | 2023-02-15 |
4e54d7ed5055bc0e7858d49aaec17bd3ed69e8da94262c6a379ddd81abc31b5e | SOCRadar | 2023-02-15 |
f4553d3aa92d4c97353645451c531881e8f0991a | SOCRadar | 2023-02-15 |
Ipv4s | Source | Last Update |
---|---|---|
189.19.189.222 | SOCRadar | 2023-02-15 |
71.10.27.196 | SOCRadar | 2023-02-15 |
181.118.183.123 | SOCRadar | 2023-02-15 |
68.53.110.74 | SOCRadar | 2023-02-15 |
68.151.196.147 | SOCRadar | 2023-02-15 |
109.200.165.82 | SOCRadar | 2023-02-15 |
154.238.151.197 | SOCRadar | 2023-02-15 |
72.88.245.71 | SOCRadar | 2023-02-15 |
68.50.190.55 | SOCRadar | 2023-02-15 |
78.182.113.80 | SOCRadar | 2023-02-15 |
181.231.229.133 | SOCRadar | 2023-02-15 |
181.81.116.144 | SOCRadar | 2023-02-15 |
64.207.215.69 | SOCRadar | 2023-02-15 |
31.166.116.171 | SOCRadar | 2023-02-15 |
177.255.14.99 | SOCRadar | 2023-02-15 |
81.214.220.237 | SOCRadar | 2023-02-15 |
154.181.203.230 | SOCRadar | 2023-02-15 |
85.114.110.108 | SOCRadar | 2023-02-15 |
99.232.140.205 | SOCRadar | 2023-02-15 |
138.0.114.166 | SOCRadar | 2023-02-15 |
207.229.167.36 | SOCRadar | 2023-02-15 |
76.169.76.44 | SOCRadar | 2023-02-15 |
197.49.50.44 | SOCRadar | 2023-02-15 |
88.232.207.24 | SOCRadar | 2023-02-15 |
119.42.124.18 | SOCRadar | 2023-02-15 |
46.186.216.41 | SOCRadar | 2023-02-15 |
181.56.125.32 | SOCRadar | 2023-02-15 |
179.24.245.193 | SOCRadar | 2023-02-15 |
61.105.45.244 | SOCRadar | 2023-02-15 |
45.132.226.209 | SOCRadar | 2023-02-15 |
102.40.236.32 | SOCRadar | 2023-02-15 |
139.195.63.45 | SOCRadar | 2023-02-15 |
104.194.10.130 | SOCRadar | 2023-02-15 |
169.1.47.111 | SOCRadar | 2023-02-15 |
151.236.28.34 | SOCRadar | 2023-02-15 |
68.129.232.158 | SOCRadar | 2023-02-15 |
171.248.157.128 | SOCRadar | 2023-02-15 |
180.180.131.95 | SOCRadar | 2023-02-15 |
176.90.193.145 | SOCRadar | 2023-02-15 |
188.157.6.170 | SOCRadar | 2023-02-15 |
118.174.200.169 | SOCRadar | 2023-02-15 |
14.183.63.12 | SOCRadar | 2023-02-15 |
85.98.206.165 | SOCRadar | 2023-02-15 |
68.224.229.42 | SOCRadar | 2023-02-15 |
191.84.204.214 | SOCRadar | 2023-02-15 |
146.70.79.52 | SOCRadar | 2023-02-15 |
138.199.59.52 | SOCRadar | 2023-02-15 |
45.51.148.111 | SOCRadar | 2023-02-15 |
62.114.193.186 | SOCRadar | 2023-02-15 |
64.52.80.212 | SOCRadar | 2023-02-15 |
2.89.78.130 | SOCRadar | 2023-02-15 |
154.246.182.210 | SOCRadar | 2023-02-15 |
172.93.100.71 | SOCRadar | 2023-02-15 |
88.242.228.16 | SOCRadar | 2023-02-15 |
156.213.107.29 | SOCRadar | 2023-02-15 |
186.154.92.181 | SOCRadar | 2023-02-15 |
193.3.19.37 | SOCRadar | 2023-02-15 |
45.89.242.2 | SOCRadar | 2023-02-15 |
197.204.243.167 | SOCRadar | 2023-02-15 |
45.61.138.29 | SOCRadar | 2023-02-15 |
181.127.138.30 | SOCRadar | 2023-02-15 |
186.50.245.74 | SOCRadar | 2023-02-15 |
186.105.182.127 | SOCRadar | 2023-02-15 |
61.70.29.53 | SOCRadar | 2023-02-15 |
181.111.20.201 | SOCRadar | 2023-02-15 |
219.69.103.199 | SOCRadar | 2023-02-15 |
194.5.53.215 | SOCRadar | 2023-02-15 |
83.110.219.59 | SOCRadar | 2023-02-15 |
95.136.41.50 | SOCRadar | 2023-02-15 |
190.59.247.136 | SOCRadar | 2023-02-15 |
98.180.234.228 | SOCRadar | 2023-02-15 |
45.86.200.21 | SOCRadar | 2023-02-15 |
109.155.5.164 | SOCRadar | 2023-02-15 |
176.42.245.2 | SOCRadar | 2023-02-15 |
91.116.160.252 | SOCRadar | 2023-02-15 |
27.73.215.46 | SOCRadar | 2023-02-15 |
37.76.197.124 | SOCRadar | 2023-02-15 |
171.238.230.59 | SOCRadar | 2023-02-15 |
94.99.110.157 | SOCRadar | 2023-02-15 |
66.181.164.43 | SOCRadar | 2023-02-15 |
99.253.251.74 | SOCRadar | 2023-02-15 |
186.167.249.206 | SOCRadar | 2023-02-15 |
23.29.115.172 | SOCRadar | 2023-02-15 |
37.37.206.87 | SOCRadar | 2023-02-15 |
70.81.121.237 | SOCRadar | 2023-02-15 |
41.69.103.179 | SOCRadar | 2023-02-15 |
41.103.226.172 | SOCRadar | 2023-02-15 |
184.99.123.118 | SOCRadar | 2023-02-15 |
191.97.234.238 | SOCRadar | 2023-02-15 |
146.70.106.61 | SOCRadar | 2023-02-15 |
1.10.253.207 | SOCRadar | 2023-02-15 |
181.80.133.202 | SOCRadar | 2023-02-15 |
45.160.124.211 | SOCRadar | 2023-02-15 |
194.37.97.161 | SOCRadar | 2023-02-15 |
45.134.22.54 | SOCRadar | 2023-02-15 |
197.11.128.156 | SOCRadar | 2023-02-15 |
179.108.32.195 | SOCRadar | 2023-02-15 |
220.116.250.45 | SOCRadar | 2023-02-15 |
100.1.5.250 | SOCRadar | 2023-02-15 |
72.66.96.129 | SOCRadar | 2023-02-15 |
88.231.221.198 | SOCRadar | 2023-02-15 |
156.219.49.22 | SOCRadar | 2023-02-15 |
197.94.84.128 | SOCRadar | 2023-02-15 |
212.30.37.227 | SOCRadar | 2023-02-15 |
139.195.132.210 | SOCRadar | 2023-02-15 |
70.51.132.197 | SOCRadar | 2023-02-15 |
187.205.222.100 | SOCRadar | 2023-02-15 |
211.248.176.4 | SOCRadar | 2023-02-15 |
45.183.234.180 | SOCRadar | 2023-02-15 |
85.98.46.114 | SOCRadar | 2023-02-15 |
23.19.58.43 | SOCRadar | 2023-02-15 |
31.32.180.179 | SOCRadar | 2023-02-15 |
85.139.203.42 | SOCRadar | 2023-02-15 |
118.68.220.199 | SOCRadar | 2023-02-15 |
23.106.160.141 | SOCRadar | 2023-02-15 |
190.158.58.236 | SOCRadar | 2023-02-15 |
102.38.97.229 | SOCRadar | 2023-02-15 |
182.213.208.5 | SOCRadar | 2023-02-15 |
41.105.197.244 | SOCRadar | 2023-02-15 |
196.92.172.24 | SOCRadar | 2023-02-15 |
88.245.168.200 | SOCRadar | 2023-02-15 |
81.56.22.251 | SOCRadar | 2023-02-15 |
190.44.40.48 | SOCRadar | 2023-02-15 |
102.101.231.141 | SOCRadar | 2023-02-15 |
41.142.132.190 | SOCRadar | 2023-02-15 |
184.82.110.50 | SOCRadar | 2023-02-15 |
87.75.195.211 | SOCRadar | 2023-02-15 |
194.5.53.86 | SOCRadar | 2023-02-15 |
123.240.131.1 | SOCRadar | 2023-02-15 |
70.49.33.200 | SOCRadar | 2023-02-15 |
89.211.223.138 | SOCRadar | 2023-02-15 |
196.112.34.71 | SOCRadar | 2023-02-15 |
185.163.110.124 | SOCRadar | 2023-02-15 |
102.184.151.194 | SOCRadar | 2023-02-15 |
31.54.39.153 | SOCRadar | 2023-02-15 |
186.120.58.88 | SOCRadar | 2023-02-15 |
212.156.51.194 | SOCRadar | 2023-02-15 |
78.141.213.249 | SOCRadar | 2023-02-15 |
173.218.180.91 | SOCRadar | 2023-02-15 |
104.243.38.65 | SOCRadar | 2023-02-15 |
160.176.204.241 | SOCRadar | 2023-02-15 |
191.254.74.89 | SOCRadar | 2023-02-15 |
210.195.18.76 | SOCRadar | 2023-02-15 |
45.241.140.181 | SOCRadar | 2023-02-15 |
47.87.229.39 | SOCRadar | 2023-02-15 |
146.70.86.44 | SOCRadar | 2023-02-15 |
88.246.170.2 | SOCRadar | 2023-02-15 |
160.152.135.188 | SOCRadar | 2023-02-15 |
201.177.163.176 | SOCRadar | 2023-02-15 |
151.234.63.48 | SOCRadar | 2023-02-15 |
84.238.253.171 | SOCRadar | 2023-02-15 |
87.220.229.164 | SOCRadar | 2023-02-15 |
47.146.182.110 | SOCRadar | 2023-02-15 |
89.211.217.38 | SOCRadar | 2023-02-15 |
41.107.78.223 | SOCRadar | 2023-02-15 |
179.223.89.154 | SOCRadar | 2023-02-15 |
194.166.205.204 | SOCRadar | 2023-02-15 |
167.60.82.242 | SOCRadar | 2023-02-15 |
176.10.80.37 | SOCRadar | 2023-02-15 |
88.251.38.53 | SOCRadar | 2023-02-15 |
113.22.102.155 | SOCRadar | 2023-02-15 |
185.77.218.10 | SOCRadar | 2023-02-15 |
194.49.79.231 | SOCRadar | 2023-02-15 |
23.106.123.13 | SOCRadar | 2023-02-15 |
110.4.255.247 | SOCRadar | 2023-02-15 |
119.82.111.158 | SOCRadar | 2023-02-15 |
105.111.60.60 | SOCRadar | 2023-02-15 |
87.243.113.104 | SOCRadar | 2023-02-15 |
118.216.99.232 | SOCRadar | 2023-02-15 |
105.99.80.23 | SOCRadar | 2023-02-15 |
45.153.241.64 | SOCRadar | 2023-02-15 |
134.35.9.144 | SOCRadar | 2023-02-15 |
141.164.254.35 | SOCRadar | 2023-02-15 |
45.86.200.77 | SOCRadar | 2023-02-15 |
41.96.171.218 | SOCRadar | 2023-02-15 |
84.38.133.191 | SOCRadar | 2023-02-15 |
46.116.229.16 | SOCRadar | 2023-02-15 |
Cves | Source | Last Update |
---|---|---|
CVE-2021-21974 | SOCRadar | 2023-02-17 |
Emails | Source | Last Update |
---|---|---|
[email protected] | SOCRadar | 2023-02-15 |
[email protected] | SOCRadar | 2023-02-15 |
[email protected] | SOCRadar | 2023-02-15 |
Domains | Insert Date |
---|
- Temporarily remove connectivity for the associated ESXi server(s).
- Upgrade your ESXi servers to the latest version of VMware ESXi software [CPG 5.1]. ESXi releases are cumulative, and the latest builds are documented in VMware’s article, Build numbers and versions of VMware ESXi/ESX.
- Harden ESXi hypervisors by disabling the Service Location Protocol (SLP) service, which ESXiArgs may leverage. For more information on executing workarounds, see VMware’s guidance How to Disable/Enable the SLP Service on VMware ESXi.
- Ensure your ESXi hypervisor is not configured to be exposed to the public internet.
- Maintain offline backups of data, and regularly test backup and restoration [CPG 7.3]. These practices safeguard an organization’s continuity of operations or at least minimize potential downtime from a ransomware incident and protect against data losses.
- Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure.
- Create, maintain, and exercise a basic cyber incident response plan and associated communications plan that includes response procedures for a ransomware incident [CPG 7.1, 7.2].
- Restrict Server Message Block (SMB) Protocol within the network to only access servers that are necessary and remove or disable outdated versions of SMB (i.e., SMB version 1). Threat actors use SMB to propagate malware across organizations.
- Require phishing-resistant MFA for as many services as possible [CPG 1.3]—particularly for webmail, VPNs, accounts that access critical systems, and privileged accounts that manage backups.
- Review the security posture of third-party vendors and those interconnected with your organization. Ensure all connections between third-party vendors and outside software or hardware are monitored and reviewed for suspicious activity.
- Implement allow-listing policies for applications and remote access that only allow systems to execute known and permitted programs.
- Open document readers in protected viewing modes to help prevent active content from running.
- Implement user training program and phishing exercises to raise awareness among users about the risks of visiting suspicious websites, clicking on suspicious links, and opening suspicious attachments. Reinforce the appropriate user response to phishing and spearphishing emails.
- Use strong passwords [CPG 1.4] and avoid reusing passwords for multiple accounts. See CISA Tip Choosing and Protecting Passwords and the NIST’s Special Publication 800-63B: Digital Identity Guidelines for more information.
- Require administrator credentials to install software [CPG 1.5].
- Audit user accounts with administrative or elevated privileges and configure access controls with least privilege in mind [CPG 1.5].
- Install and regularly update antivirus and antimalware software on all hosts.
- Consider adding an email banner to messages coming from outside your organizations.
- Disable hyperlinks in received emails.
- Consider participating in CISA’s no-cost Automated Indicator Sharing (AIS) program to receive real-time exchange of machine-readable cyber threat indicators and defensive measures.
- Run <i>cd /usr/lib/vmware/hostd/docroot/ui/ && mv index.html ransom.html && mv index1.html index.html.</i>
- Run <i>cd /usr/lib/vmware/hostd/docroot && mv index.html ransom.html && rm index.html && mv index1.html index.html.</i>
- Reboot the ESXi server (e.g., with the reboot command). After a few minutes, you should be able to navigate to the web interface.
- If the VM you restored already exists, right click on the VM and select <i>Unregister</i> (see figure 1).

- Select Create / Register VM (see figure 2).
- Select Register an existing virtual machine (see figure 2).
- Click <i>Select one or more virtual machines, a datastore or a directory</i> to navigate to the folder of the VM you restored. Select the <i>vmx</i> file in the folder (see figure 3).

- Select Next and Finish. You should now be able to use the VM as normal.
- Review network logging to and from ESXi hosts and the guest VMs for unusual scanning activity.
- Review traffic from network segments occupied by the ESXi hosts and guests. Consider restricting non-essential traffic to and from these segments.
File Name | Description | Actions |
---|---|---|
aa23-039a-esxiargs-ransomware-virtual-machine-recovery-guidance.pdf | The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign, known as “ESXiArgs |
APT Name | Aliases | Target Countries | Source Countries | Total IOCs |
---|