Thanks to visit codestin.com
Credit goes to attack.mitre.org

Cheerscrypt

Cheerscrypt is a ransomware that was developed by Cinnamon Tempest and has been used in attacks against ESXi and Windows environments since at least 2022. Cheerscrypt was derived from the leaked Babuk source code and has infrastructure overlaps with deployments of Night Sky ransomware, which was also derived from Babuk.[1][2]

ID: S1096
Type: MALWARE
Platforms: Windows, ESXi
Version: 1.1
Created: 18 December 2023
Last Modified: 15 April 2025

Techniques Used

Domain ID Name Use
Enterprise T1059 .012 Command and Scripting Interpreter: Hypervisor CLI

Cheerscrypt has leveraged esxcli in order to terminate running virtual machines.[2]

Enterprise T1486 Data Encrypted for Impact

Cheerscrypt can encrypt data on victim machines using a Sosemanuk stream cipher with an Elliptic-curve Diffie–Hellman (ECDH) generated key.[2][1]

Enterprise T1083 File and Directory Discovery

Cheerscrypt can search for log and VMware-related files with .log, .vmdk, .vmem, .vswp, and .vmsn extensions.[2]

Enterprise T1489 Service Stop

Cheerscrypt has the ability to terminate VM processes on compromised hosts through execution of esxcli vm process kill.[2]

Enterprise T1673 Virtual Machine Discovery

Cheerscrypt has leveraged esxcli vm process list in order to gather a list of running virtual machines to terminate them.[2]

Groups That Use This Software

ID Name References
G1021 Cinnamon Tempest

[1][2]

References