Ransomware Research

Yogynicof Ransomware

Yogynicof is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on June 1, 2020, this ransomware has been actively targeting systems worldwide.

Quick Facts

Ransomware Family
Yogynicof
First Seen
June 1, 2020

How Yogynicof Ransomware Works

Targeted Files

daaad240d80db46e70c99b8f667a2ce8634d88bacdfeb85ed866ee774df71320 -> NO extension for encrypted files 1d28929f9b02c36ab2c65f916eb2d3b4bd36957c1dee8144a70d51d99d1da9d8 -> removes extensions

Ransom Note and Payment Demands

After encrypting files, Yogynicof displays ransom notes demanding payment for file recovery:

file/^Read me! 1?[0-9]{1} \.html$/

Ransom message:

notes/Read me! 0 .html

Note locations:

Desktop
file/^Read-me! 1?[0-9]{1} \.html$/

Ransom message:

notes/Read-me! 10 .html

Note locations:

Desktop

Technical Indicators

Associated Executable Files

The following executable files are associated with Yogynicof ransomware:

  • github.exe
  • Wnm.exe

Elastio Can Help You

Don't let Yogynicof ransomware take over your data

Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.

About This Analysis

This Yogynicof ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Yogynicof.

Last updated: July 30, 2025

Yogynicof Ransomware - Detectable by Elastio