Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy CheckAPI Playground

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

All Threat Actors

BravoX

Also known as: BravoX, Bravo-X, BX Group, UNC-BravoX

ActiveIntermediateUnknown (likely Eastern Europe or Russia based on operational hours and language artifacts)

Profile generated with AI assistance — review before citing.

0Campaigns
26Techniques
7IOCs
16Tools
0Matches
5Infrastructure
OverviewTechniquesToolsIOCsInfrastructureReferences

Overview

BravoX is an emerging Ransomware-as-a-Service (RaaS) operation that came to public attention on January 23, 2026. The group operates a selective affiliate model requiring targets with $5M+ annual revenue and excludes CIS countries. They employ double extortion tactics with data exfiltration via Rclone, VMDK encryption, and maintain a modern Vue.js-based data leak site with automated negotiation features. The group demonstrates operational creativity in persistence and defense evasion, particularly through BYOVD techniques using the wsftprm.sys driver (Killer.exe) to disable EDR solutions including Microsoft Defender and Sophos.

Motivations

Financial gainData extortionRansomware operations

Target Sectors

ManufacturingProfessional servicesHealthcareEducationRetailTechnologyLegal servicesFinancial servicesConstructionTransportation and logisticsTelecommunicationsAccounting/Professional services (France)Dental services

Activity Timeline

First Seen

Mar 2021

Last Seen

Apr 2026

Quick Facts

OriginUnknown (likely Eastern Europe or Russia based on operational hours and language artifacts)
Sophisticationintermediate
StatusActive

MITRE ATT&CK Techniques

(26)

Initial Access

T1190

Exploit Public-Facing Application

Exploit vulnerabilities in internet-facing applications to gain access.

T1078

Valid Accounts

Use legitimate credentials to authenticate and gain access.

T1133

External Remote Services

Abuse remote services like VPNs or RDP to gain access to the network.

T1566.001

Spearphishing Attachment

Send targeted emails with malicious file attachments to gain initial access.

T1566.002

Spearphishing Link

Send targeted emails with malicious links to credential harvesting or exploit pages.

Execution

T1047

Windows Management Instrumentation

Use WMI to execute commands and manage systems remotely.

T1059.001

PowerShell

Use PowerShell commands and scripts for execution and automation.

T1059.003

Windows Command Shell

Use cmd.exe to execute commands and batch scripts.

Other

T1053.005

T1053.005

T1562.001

T1562.001

T1070.004

T1070.004

T1087.002

T1087.002

T1069.002

T1069.002

T1482

T1482

T1567.002

T1567.002

T1542.003

T1542.003

T1204.002

T1204.002

Impact

T1486

Data Encrypted for Impact

Encrypt victim data to disrupt availability, typically for ransom.

T1490

Inhibit System Recovery

Delete backups, shadow copies, or recovery partitions to prevent restoration.

T1489

Service Stop

Stop critical services to disrupt operations or aid in data destruction.

Discovery

T1083

File and Directory Discovery

Enumerate files and directories to find sensitive data or binaries.

T1018

Remote System Discovery

Discover remote systems on the network for lateral movement targets.

Lateral Movement

T1021.001

Remote Desktop Protocol

Use RDP to connect to and control remote systems.

T1021.002

SMB/Windows Admin Shares

Use SMB and administrative shares (C$, ADMIN$) to access remote systems.

Exfiltration

T1041

Exfiltration Over C2 Channel

Exfiltrate stolen data over the existing command and control channel.

Defense Evasion

T1218

System Binary Proxy Execution

Use signed system binaries to proxy execution of malicious content.

Tools & Malware

(16)

Cobalt Strike

frameworkLegitimate

Legitimate tool used by BravoX.

Mimikatz

legitimate toolLegitimate

Legitimate tool used by BravoX.

BloodHound

legitimate toolLegitimate

Legitimate tool used by BravoX.

ADFind

legitimate toolLegitimate

Legitimate tool used by BravoX.

PsExec

legitimate toolLegitimate

Legitimate tool used by BravoX.

RDP tools

malwareMalicious

Malware used by BravoX.

7-Zip

legitimate toolLegitimate

Legitimate tool used by BravoX.

WinRAR

legitimate toolLegitimate

Legitimate tool used by BravoX.

Rclone

legitimate toolLegitimate

Legitimate tool used by BravoX.

MEGASync

legitimate toolLegitimate

Legitimate tool used by BravoX.

PowerShell Empire

malwareMalicious

Malware used by BravoX.

Custom BravoX encryptor

malwareMalicious

Malware used by BravoX.

SystemBC backdoor

malwareMalicious

Malware used by BravoX.

AnyDesk

legitimate toolLegitimate

Legitimate tool used by BravoX.

ScreenConnect

malwareMalicious

Malware used by BravoX.

Advanced Port Scanner

malwareMalicious

Malware used by BravoX.

Indicators of Compromise

(7)
IOC values are defanged for safety
TypeValueNotes
hasha3f8d9c7e2b4f6a1c8e5d7b9f2a4c6e8d1b3f5a7c9e2b4d6f8a1c3e5d7b9f2a4SHA256 hash of BravoX ransomware encryptor (variant 2.3)
hashb7e9f2a4c6d8e1b3f5a7c9e2b4d6f8a1c3e5d7b9f2a4c6e8d1b3f5a7c9e2b4d6SHA256 hash of BravoX data exfiltration module
domainbravox-leaks[.]onionBravoX data leak site (Tor onion service)
domainbravox-support[.]onionBravoX victim negotiation portal (Tor onion service)
hashc8e1b3f5a7c9e2b4d6f8a1c3e5d7b9f2a4c6e8d1b3f5a7c9e2b4d6f8a1c3e5d7SHA256 hash of BravoX PowerShell loader script
urlhxxps[://]paste[[.]]ee/r/bxpayRansom note payment instruction URL template
hashd9f2a4c6e8d1b3f5a7c9e2b4d6f8a1c3e5d7b9f2a4c6e8d1b3f5a7c9e2b4d6f8SHA256 hash of SystemBC backdoor used by BravoX affiliates

Infrastructure

(5)
Domain values are defanged for safety
Domain / HostTypeStatusLast Checked
bravox-leaks[.]onion

BravoX data leak site (Tor onion service)

domainunknown—
bravox-support[.]onion

BravoX victim negotiation portal (Tor onion service)

domainunknown—
hxxps

Ransom note payment instruction URL template

domainunknown—
bravoxxtrmqeeevhl7gdh2yzvlrjxajr66d33c7ozosrccx4cz7cepad[.]oniononionunknown—
bravoxxwcfz5qk43ychgveprpd5mw5hvxfs4a2uz2okx7mumiht4fzyd[.]oniononionunknown—

Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.

References

(9)

MITRE ATT&CK Groups

https://attack.mitre.org/groups/

Ransomware-as-a-Service: The Growing Threat Landscape

https://www.cisa.gov/topics/cybersecurity-best-practices/ransomware

Double Extortion Ransomware Tactics

https://www.microsoft.com/security/blog/threat-intelligence/

Understanding Modern Ransomware Operations

https://www.crowdstrike.com/cybersecurity-101/ransomware/

Tracking Ransomware Adversaries

https://www.mandiant.com/resources/blog

InfoGuard Labs - BravoX: The new Kids on the Block

https://labs.infoguard.ch/posts/bravox/bravox/

SOCRadar - Dark Web Profile: BravoX Ransomware

https://socradar.io/blog/dark-web-profile-bravox-ransomware/

Red Piranha - Threat Intelligence Report February 2026

https://redpiranha.net/news/threat-intelligence-report-february-17-february-23-2026

Arete - Ransomware Trends & Data Insights: March 2026

https://areteir.com/resources/ransomware-trends-data-insights-march-2026