mor3intel logo
mor3intelThreat Intelligence
DashboardVictimsGroupsCountriesStatsATT&CKRulesIOC Lookup
InstagramTelegram
5 Active Threats
Back to Dashboard

Play

active

Also known as: PlayCrypt, Play Ransomware

Play ransomware (also known as PlayCrypt) emerged in mid-2022 and has targeted numerous organizations including critical infrastructure. The group is known for exploiting ProxyNotShell vulnerabilities and other Exchange Server flaws.

First Seen

2022-06

Last Activity

2025-01

Target Regions

3 regions

Industries

5 sectors

GovernmentHealthcareTechnologyManufacturingTelecommunications
Attack Chain (MITRE ATT&CK)
Visual representation of the attack phases and techniques used by Play

Click on a phase to view details and MITRE ATT&CK technique IDs

Tactics & Techniques
MITRE ATT&CK mapped tactics and techniques used by this threat actor
Technique IDNameTacticDescriptionReference
T1190Exploit Public-Facing ApplicationInitial AccessProxyNotShell (CVE-2022-41040, CVE-2022-41082)MITRE
T1486Data Encrypted for ImpactImpactIntermittent encryption with .play extensionMITRE
Indicators of Compromise (IOCs)
Known IOCs associated with Play operations
TypeValueDescriptionLast SeenActions
hashf63a2a5f2cc9f69fcd92a57b4d6ee72fd8e76d7e8ec5f2f5a9a4d6e2e1f0c9b8Play ransomware binary2025-01-15
filenameReadMe.txtRansom note—

IOCs are defanged for safety. Click copy to get the clean value.

Detection Guidance
SIEM and EDR detection recommendations for identifying Play activity
  • 1
    Monitor Exchange Server for ProxyNotShell exploitation
  • 2
    Detect GPO modifications disabling security tools
  • 3
    Alert on WinRAR command-line archiving
  • 4
    Monitor for .play file extension
Mitigation, Containment & Recovery
Step-by-step guidance for responding to and recovering from this ransomware attack
  • 1
    Patch Microsoft Exchange immediately
  • 2
    Disable OWA if not needed
  • 3
    Block known IOCs
mor3intel logomor3intel

This platform is intended for defensive cybersecurity, incident response, and recovery purposes only. Information provided is for educational and defensive use.

@mor3cod3@mor3cod3
© 2026 mor3intel