Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggled to draw consideration.
Nonetheless, after a Mallox affiliate’s staging server was leaked in Could 2024, Kryptina’s modified model, branded Mallox v1.0, gained prominence.
The analysis examines the information uncovered within the leak, highlighting variations between the unique Kryptina RaaS (v2.2) and Mallox v1.0 by revealing that the Mallox variant incorporates enhancements to the platform’s performance, making it a extra engaging choice for risk actors looking for to launch ransomware campaigns.


Mallox, a mature ransomware-as-a-service platform, has been lively since 2021, focusing on enterprises via vulnerabilities and brute pressure assaults. Kryptina, initially offered by “Corlys,” was later leaked on-line, revealing its supply code and connection to Mallox.
This leak uncovered a Mallox affiliate’s use of Kryptina for Linux payloads, suggesting a possible collaboration or customization.
Nevertheless, Kryptina’s uniqueness inside the Mallox ecosystem signifies a posh relationship between the 2, probably involving unbiased improvement or acquisition.


Risk actors repurposed leaked Kryptina ransomware supply code to create Mallox Linux 1.0. The core performance, together with AES-256 CBC encryption and OpenSSL decryption, stays unchanged.
Free Webinar on How you can Shield Small Companies Towards Superior Cyberthreats -> Free Registration
Whereas Kryptina branding is faraway from most recordsdata, references persist in operate names (e.g., krptna_process_file) inside the /src folder. Mallox features a stripped-down model of the unique Kryptina documentation translated into Russian.
Ransomware word templates had been modified to mirror Mallox branding. The core encryptor supply file (kryptina. c) retains the unique Kryptina title however has feedback and debug messages up to date for Mallox.
Equally, the scripting_demo.py script used for automated payload builds was minimally modified to take away Kryptina references.


The Kryptina and Mallox makefiles are used to construct encryptor and decryptor payloads. Each makefiles provide numerous construct modes, together with demo, debug, symbols, and arch32. Extra parameters may also be personalized for XOR key, thread depend, self-deletion, filesize constraints, and safe deletion.
The Mallox makefile introduces new parameters for payload kind (crypto or decryptor), compression degree, and the power to incorporate a customized payload header. Each makefiles permit for versatile payload configuration primarily based on particular necessities.


The Could 2024 affiliate leak uncovered a trove of target-specific information, together with 14 potential sufferer subfolders containing config.json recordsdata and compiled encryptor/decryptor instruments with equivalent cost addresses and ransom word templates.
Based on Sentinel Labs, the config recordsdata contained particular particulars akin to cost kind, addresses, and ransom word content material, indicating a coordinated and focused assault marketing campaign.
Mallox malware makes use of leaked affiliate servers to focus on Home windows programs. The server incorporates numerous instruments for preliminary compromise, together with an exploit for CVE-2024-21338 (Home windows privilege escalation) and a instrument to disable Kaspersky endpoint merchandise.
They’re additionally discovered on the server, together with PowerShell scripts and a JAR file that launches a PowerShell script to obtain Mallox.
The server additionally incorporates a full offline installer of Java JRE and extra dropper/payload units for 32-bit and 64-bit programs.
Analyse AnySuspicious Hyperlinks Utilizing ANY.RUN's New Protected Looking Software: Strive It for Free