Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

YARA Rule: fog.yar

Group:
Valid Rule

/*
Fog ransomware
*/

rule Fog_Ransomnote
{
    meta:
        author = "ransomware.live"
        family = "ransomware.fog"
        description = "Detects Fog ransomware ransom note"
        date = "2026-05-04"
        severity = 7
        score = 70

    strings:
        $s1 = "FOG" ascii
        $s2 = ".flocked" ascii
        $s3 = "fog.onion" ascii nocase
        $s4 = "fogransomware" ascii nocase

    condition:
        2 of them
}

rule Fog_EncryptedFile
{
    meta:
        author = "ransomware.live"
        family = "ransomware.fog"
        description = "Detects Fog ransomware encrypted file extension"
        date = "2026-05-04"
        severity = 7
        score = 70

    strings:
        $ext1 = ".flocked" ascii
        $ext2 = ".FOG" ascii

    condition:
        any of them
}