Mallox ransomware has a new variant that uses the .malox extension and is delivered via BatLoader, enabling on-the-fly payload delivery through a batch script injected into MSBuild.exe. The campaign demonstrates heavily obfuscated payloads, PowerShell-based extraction, and aggressive process/service disruption to evade defenses. #Mallox #BatLoader #QuasarRAT #AsyncRAT #RedlineStealer #DC_RAT
Keypoints
- The Mallox ransomware family now appends the .malox extension to encrypted files (updated from .mallox).
- A BatLoader-based infection chain embeds the ransomware payload in a batch script; no disk-downloaded payload is saved to disk at runtime.
-
MITRE Techniques
- [T1204] User Execution – Initial infection occurs when the user clicks the attachment in the spam email. ‘The initial infection occurs once the user clicks on the attachment included in the spam email.’
- [T1140] Deobfuscate/Decode Files or Information – The batch script utilized in this case is obfuscated, employing various variables that are defined in a random sequence. ‘The batch script utilized in this case is obfuscated, employing various variables that are defined in a random sequence.’
- [T1562] Impair Defences – The PowerShell payload drops a batch script that can kill processes, stop and disable services, and delete services. ‘The batch script dropper… can kill over 600 processes…, stop over 200 services…, disable over 13 services…, and delete over 200 services.’
- [T1222] Hidden Files and Directories – The batch script copies and hides a PowerShell executable by setting hidden/system attributes. ‘attrib +s +h’
- [T1036] Masquerading – The PowerShell executable is copied and renamed (e.g., ‘ransomware.bat.exe’) to blend with legitimate files. ‘PowerShell executable (powershell.exe) to a file named “batch script name” + “.exe” … PowerShell.exe copied as “ransomware.bat.exe”.’
- [T1070] File Deletion – The payload deletes numerous services; the batch script uses commands like ‘sc delete’. ‘Deletes over 200 services using the sc delete command.’
- [T1486] Data Encrypted for Impact – Encrypted files are marked with the .malox extension, indicating data encryption. ‘The ransomware appends the encrypted files with the “.malox” extension.’
- [T1071] Application Layer Protocol – The activity is aligned with C2 over application-layer protocols in the network communications. ‘Application Layer Protocol’
Indicators of Compromise
- [MD5] BatLoader – dcf060e00547cfe641eff3f836ec08c8
- [SHA1] BatLoader – 8054569d8b449e4cd0211cb2499c19f42557fb21
- [SHA256] BatLoader – 2565158b0a023299c1922423a065b9825fd1769f1a87ffd2031375a0e893d523318
- [MD5] Killerrr.bat – 9a239885dc7044a9289610d58585167b
- [SHA1] Killerrr.bat – 28b8b4c9fe29ba0e815e525d2529b92217877e85
- [SHA256] Killerrr.bat – 0de0da8037176c3c9cb403e2865a7699e53ff5a013070132ba512b9dab7a0126
- [URL] Malicious URL – hxxps[:]//whyers.io/QWEwqdsvsf/ap.php
- [URL] Malicious URL – http://80.66.75.116/Tst.bat
Read more: https://blog.cyble.com/2023/06/22/mallox-ransomware-implements-new-infection-strategy/