High Ransomware Active TLP:CLEAR

SafePay Ransomware

SafePay is an emerging double-extortion ransomware operation known for its LOLBins-heavy attack methodology and rapid 24-hour attack cycle from initial access to encryption. Unlike most modern ransomware, SafePay does NOT operate as RaaS, maintaining centralized control with consistent TTPs across all attacks.

Attribution
Eastern Europe (CIS Exclusion)
Hunt Time
4-6 hours
First Observed
September 2024
Targets
MSPs, SMBs, Manufacturing, Healthcare
270+
Victims Since Sept 2024
24 hrs
Access to Encryption
20%
German Targets
Non-RaaS
Centralized Operations
1
Executive Summary

Critical Timing Window

SafePay consistently achieves full network encryption within 24 hours of initial access. Rapid detection and response is essential—if initial access indicators are detected, assume the clock is already running.

SafePay is a rapidly emerging ransomware threat that has victimized over 270 organizations since its emergence in September 2024, with 73 victims claimed in May 2025 alone. Unlike most modern ransomware operations, SafePay does not operate as Ransomware-as-a-Service (RaaS), maintaining centralized control over all operations without affiliates.

Why This Matters for Defenders: SafePay's non-RaaS model results in highly consistent TTPs across all attacks, making detection signatures more reliable than typical ransomware hunts. The group's heavy reliance on Living-off-the-Land Binaries (LOLBins) creates multiple detection opportunities at each stage of the attack chain.

Key Characteristics

24-hour attack cycle from initial access to encryption
Non-RaaS: consistent TTPs across all attacks
Heavy LOLBins usage enables detection opportunities
Targets MSPs for downstream supply chain access
ChaCha20 encryption, .safepay extension
CIS country killswitch (Cyrillic detection)
Dual communication: Tor + TON network
LockBit 3.0 code lineage from 2022 leak

Threat Actor Intelligence

Attribution

Eastern Europe (CIS Exclusion)

First Observed

September 2024

Motivation

Financial (Criminal)

Skill Level

High / Advanced

Operating Model

Non-RaaS (Centralized)

Code Lineage

LockBit 3.0 (leaked source)

Geographic Focus: Primary targets include United States, Germany (20% of victims), United Kingdom, Canada, and Mexico. The disproportionate focus on German organizations is unusual and may indicate specific operational interest or language capabilities.

2
24-Hour Attack Flow

SafePay's attack chain is characterized by speed and efficiency. The group consistently moves from initial access to full network encryption in under 24 hours.

T+0

Phase 1: Initial Access

  • VPN credential theft (no MFA) or RDP exploitation
  • Fortinet firewall misconfiguration abuse
  • Social engineering via Microsoft Teams (impersonating IT)
T+1-4h

Phase 2: Discovery & Defense Evasion

  • ShareFinder.ps1 / Invoke-ShareFinder for network share enumeration
  • Windows Defender disabled via LOLBins and registry manipulation
  • CMSTPLUA UAC bypass for privilege escalation
T+4-8h

Phase 3: Lateral Movement

  • PsExec for remote execution across network
  • WinRM / PowerShell remoting
  • RDP for interactive access to critical systems
  • ScreenConnect / RMM tool installation for persistence
T+8-16h

Phase 4: Data Exfiltration

  • WinRAR / 7-Zip for data compression with exclusions
  • FileZilla FTP transfers to external servers
  • Rclone for cloud storage exfiltration
  • RDP clipboard for smaller data theft
T+16-24h

Phase 5: Impact

  • Shadow copy deletion (vssadmin, wmic)
  • 33+ processes and 13+ services terminated
  • Regsvr32.exe executes locker.dll with 32-byte key
  • ChaCha20 encryption, .safepay extension, readme_safepay.txt dropped
3
MITRE ATT&CK Mapping

SafePay leverages a comprehensive set of techniques across the attack lifecycle. Their non-RaaS model results in highly consistent TTPs.

T1078
Valid Accounts
VPN credentials without MFA
T1190
Exploit Public-Facing App
Fortinet firewall exploitation
T1059.001
PowerShell
ShareFinder.ps1 discovery
T1218.010
Regsvr32
Ransomware DLL execution
T1548.002
Bypass UAC
CMSTPLUA COM hijacking
T1562.001
Disable Security Tools
Windows Defender manipulation
T1135
Network Share Discovery
ShareFinder enumeration
T1021.002
SMB/Admin Shares
PsExec lateral movement
T1560.001
Archive via Utility
WinRAR/7-Zip staging
T1048
Exfiltration Alt Protocol
FileZilla FTP, Rclone
T1486
Data Encrypted for Impact
ChaCha20 encryption
T1490
Inhibit System Recovery
Shadow copy deletion
4
Hunt Modules

The complete threat hunting guide includes 10 detailed hunt modules covering the full SafePay attack chain:

1
VPN/RDP Compromise Detection
Critical 30 min
Identify unauthorized VPN connections and RDP access patterns from unusual geographic locations or outside business hours.
2
ShareFinder.ps1 Reconnaissance
High 25 min
Detect execution of ShareFinder.ps1 or Invoke-ShareFinder used for network share enumeration.
3
Windows Defender Tampering
Critical 30 min
Identify attempts to disable or tamper with Windows Defender via PowerShell or registry modifications.
4
UAC Bypass via CMSTPLUA
High 20 min
Detect CMSTPLUA COM object hijacking used for UAC bypass and privilege escalation.
5
Lateral Movement - PSExec/WinRM
Critical 35 min
Identify lateral movement using PsExec, WinRM, RDP, and RMM tools like ScreenConnect.
6
Regsvr32 DLL Execution
Critical 20 min
Detect ransomware execution via regsvr32.exe with characteristic 32-byte password argument.
7
Data Staging and Exfiltration
High 35 min
Detect data staging via archiving tools and exfiltration using FileZilla, Rclone, or RDP clipboard.
8
Shadow Copy Deletion
Critical 15 min
Detect deletion of Volume Shadow Copies using vssadmin, wmic, or bcdedit.

Full hunt module details with Splunk, KQL, and PowerShell queries available in the complete guide.

5
Key Detection Opportunities

SafePay's heavy reliance on LOLBins provides multiple detection opportunities throughout the attack chain:

Regsvr32 + Long Arguments

Process creation: regsvr32.exe with command line >60 chars containing .dll - indicates ransomware deployment

ShareFinder.ps1

PowerShell script block logging containing 'Invoke-ShareFinder' or 'Find-DomainShare'

Defender Tampering

Registry modifications to HKLM\SOFTWARE\Microsoft\Windows Defender\* or Set-MpPreference cmdlets

Shadow Copy Deletion

Process creation: vssadmin delete shadows OR wmic shadowcopy delete

CMSTPLUA UAC Bypass

Registry modification in HKCU\...\{3E5FC7F9-9A51-4367-9063-A120244FBEC7}

.safepay Extension

High volume file rename operations with .safepay extension indicates active encryption

MSP Supply Chain Risk

SafePay has been linked to the Ingram Micro breach affecting thousands of MSP partners. If your organization uses MSP services, investigate any RMM tool sessions or administrative access from MSP infrastructure.

6
Indicators of Compromise

File Indicators

Type Value Context
SHA256 a0dc80a37eb7e2716c02a94adc8df9baedec192a77bde31669faed228d9ff526 SafePay binary
SHA256 327b8b61eb446cc4f710771e44484f62b804ae3d262b57a56575053e2df67917 SafePay binary
SHA256 fd509df74a8d6a9e96762337efd46280ebf8d154c6c5dfbac7b3e8f7bb61f191 SafePay binary
SHA256 625abbf876f256662f33a88c122bf787edf74b882c35adbd61562b5bd1b2ac27 SafePay binary

Network Indicators

Type Value Context
IPv4 45.91.201.247 C2 server
IPv4 77.37.49.40 C2 server
IPv4 80.78.28.63 C2 server
Onion nz4z6ruzcekriti5cjjiiylzvrmysyqwibxztk6voem4trtx7gstpjid.onion Victim portal
Email VanessaCooke94@protonmail.com Contact in ransom notes

File System Indicators

Indicator Value
Encrypted file extension .safepay
Ransom note filename readme_safepay.txt
Common DLL location C:\locker.dll
Registry autorun value 6F22-C16F-0C71-688A

Download Complete Threat Hunting Guide

Get the full SafePay guide with 10 hunt modules, detection queries (Splunk, KQL, PowerShell), complete IOC list, and Sigma/YARA rules.

Download PDF — Free

Track SafePay with BRACE

BRACE delivers monthly sector-specific threat intelligence covering SafePay activity, including:

  • SafePay campaign analysis and victim tracking
  • Detection rules for LOLBins abuse and lateral movement
  • MITRE ATT&CK mappings for ransomware TTPs
  • Sector-specific threat hunting playbooks

Stay Ahead of SafePay Ransomware

BRACE delivers monthly threat intelligence on SafePay and 175+ other threat groups with detection rules and hunting playbooks for your sector.