New Mallox ransomware Linux variant based mostly on leaked Kryptina code

0
17
New Mallox ransomware Linux variant based mostly on leaked Kryptina code


New Mallox ransomware Linux variant based mostly on leaked Kryptina code

An affiliate of the Mallox ransomware operation, also referred to as TargetCompany, was noticed utilizing a barely modified model of the Kryptina ransomware to assault Linux programs.

This model, in accordance with SentinelLabs, is separate from different Linux-targeting variants of Mallox, such because the one described final June by Pattern Micro researchers, highlighting the shifting ways of the ransomware ecosystem.

Additionally, that is one other signal that Mallox, beforehand a Home windows-only malware, is placing Linux and VMWare ESXi programs into its crosshairs, marking a big evolution for the operation.

From Kryptina to Mallox

Kryptina was launched as a low-cost ($500-$800) ransomware-as-a-service (RaaS) platform for focusing on Linux programs in late 2023 however failed to achieve traction within the cybercrime group.

In February 2024, its purported administrator, utilizing the alias “Corlys,” leaked Kryptina’s supply code at no cost on hacking boards, which was presumably acquired by random ransomware actors taken with getting their fingers on a working Linux variant.

Threat actor leaking the source code
Risk actor leaking the supply code
Supply: SentinelLabs

After a Mallox affiliate suffered an operational error and uncovered their instruments, SentinelLabs found that Kryptina had been adopted by the undertaking and its supply code was used for constructing rebranded Mallox payloads.

Kryptina source code on the exposed server
Kryptina supply code on the uncovered server
Supply: SentinelLabs

The rebranded encryptor, named “Mallox Linux 1.0,” makes use of Kryptina’s core supply code, the identical AES-256-CBC encryption mechanism and decryption routines, and likewise the identical command-line builder and configuration parameters.

This means that the Mallox affiliate solely modified the looks and title, eliminated references to Kryptina on ransom notes, scripts, and information, and transposed the prevailing documentation right into a “lite” kind, leaving all the remaining unchanged.

The Mallox Linux 1.0 ransom note
The Mallox Linux 1.0 ransom be aware
Supply: SentinelLabs

Aside from Mallox Linux 1.0, SentinelLabs discovered numerous different instruments on the risk actor’s server, together with:

  • A reputable Kaspersky password reset software (KLAPR.BAT)
  • An exploit for CVE-2024-21338, a privilege escalation flaw on Home windows 10 and 11
  • Privilege escalation PowerShell scripts
  • Java-based Mallox payload droppers
  • Disk picture information containing Mallox payloads
  • Information folders for 14 potential victims

At present, it stays unsure whether or not the Mallox Linux 1.0 variant is being utilized by a single affiliate, a number of associates, or all Mallox ransomware operators alongside the Linux variant mentioned in our earlier report

LEAVE A REPLY

Please enter your comment!
Please enter your name here