Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

YARA Rule: threeam.yar

Group:
Valid Rule

/*
ThreeAM ransomware (Rust-based)
*/

rule ThreeAM_Ransomnote
{
    meta:
        author = "ransomware.live"
        family = "ransomware.threeam"
        description = "Detects ThreeAM ransomware ransom note"
        date = "2026-05-04"
        severity = 7
        score = 70

    strings:
        $s1 = "RECOVER-FILES.txt" ascii nocase
        $s2 = "ThreeAM" ascii nocase
        $s3 = "Three Am" ascii nocase
        $s4 = ".threeamtime" ascii

    condition:
        any of them
}

rule ThreeAM_PE
{
    meta:
        author = "ransomware.live"
        family = "ransomware.threeam"
        description = "Detects ThreeAM ransomware executable"
        date = "2026-05-04"
        severity = 9
        score = 90

    strings:
        $s1 = "ThreeAM" ascii wide
        $s2 = ".threeamtime" ascii
        $s3 = "RECOVER-FILES" ascii

    condition:
        uint16(0) == 0x5A4D and 2 of them
}