Snzh.7z Apr 2026
: Creates a file named !!!_How_to_Decrypt_Files_!!!.txt or ReadMe.html in affected folders [4, 5]. Behavior :
: Scans the local network for SMB shares to encrypt mapped and unmapped network drives [5]. Technical Indicators snzh.7z
: Disconnect infected machines from the network immediately to prevent further spread [4]. : Creates a file named
: Uses vssadmin.exe to delete Volume Shadow Copies, making local recovery without a backup impossible [2, 4]. : Uses vssadmin
The file is an archive associated with the Snzh (Snooze) ransomware, a variant of the MedusaLocker ransomware family [1, 3]. It typically contains the ransomware payload or tools used by attackers to facilitate the encryption of local and network drives [2, 5]. Malware Analysis: Snzh Ransomware Malware Family : MedusaLocker (Variant: Snzh/Snooze) [1].
Keep all software and operating systems updated to patch vulnerabilities used for initial access [4].
: Modifies the Windows Registry to ensure the ransomware runs on system startup [2].
