Mallox ransomware activity has surged, driven by a .NET-based loader that downloads encrypted payloads and decrypts them in memory before encryption. The operation targets critical infrastructure, stops GPS-related services, and uses a private chat and leak site for ransom negotiations. #Mallox #MalloxLoader
Keypoints
- Mallox activity has recently spiked, with observable samples and a leak site indicating ongoing campaigns.
- An unknown .NET-based loader delivers Mallox by downloading encrypted payloads and decrypting them in memory, avoiding on-disk presence.
- The encrypted payload is a 32βbit .NET DLL (Wwxjdcapjnmuq.dll) decrypted in memory with a hardcoded AES key and then executed.
- The loader uses IntelliLock obfuscation and dynamically loads the ransomware DLL as an assembly, creating a thread pool to run the code.
- A batch file (Axfiysgodhtrlqmrgpchkiller.bat) is dropped to stop numerous services and programs (including GPS-related ones) before encryption.
- Evidence suggests targeting of critical infrastructure or OT-related operations, inferred from GPS service disruption and related tooling.
<liVictimsβ information is exfiltrated to a C2 via POST, and the ransom note includes a private chat for victims and a decryption-testing feature for the attackers.
MITRE Techniques
- [T1204] User Execution β The loader usually arrives via spam email with different flavors to lure the users into downloading and executing the email attachment. β βThe loader usually arrives via spam email with different flavors to lure the users into downloading and executing the email attachment.β
- [T1140] Deobfuscate/Decode Files or Information β The loader decrypts the payload to get the actual ransomware binary in the memory and further executes this binary to perform ransomware activities. β βThe loader now decrypts the payload to get the actual ransomware binary in the memory and further executes this binary to perform ransomware activities.β
- [T1562] Impair Defenses β The loader executes the malicious content in the memory without saving the actual payload in the disk to evade anti-virus detection. β βThe loader executes the malicious content in the memory without saving the actual payload in the disk to evade anti-virus detection.β
- [T1082] System Information Discovery β Before encrypting the files, the ransomware exfiltrates system information such as Operating system version, Desktop name, etc., and sends it to the Command & Control (C&C) server using a POST request as shown below. β βBefore encrypting the files, the ransomware exfiltrates system information such as Operating system version, Desktop name, etc., and sends it to the Command & Control (C&C) server using a POST request as shown below.β
- [T1083] File and Directory Discovery β The loader enumerates methods from the DLL file and creates a list of method names and objects from the loaded assembly. β βThe loader enumerates methods from the DLL file and creates a list of method names and objects from the loaded assembly.β
- [T1486] Data Encrypted for Impact β The ransomware then encrypts the files, appends β.Malloxβ as a file extension, and drops a ransom note in the folders. β βThe ransomware then encrypts the files, appends β.Malloxβ as a file extension, and drops a ransom note in the folders.β
- [T1071] Application Layer Protocol β The ransom operation communicates with a C2 server via HTTP POST, indicating application-layer protocol usage. β βsends it to the Command & Control (C&C) server using a POST request.β
Indicators of Compromise
- [URL] Malicious URL β hxxp://80[.]66[.]75[.]98/Chseiyk.jpeg. β Malicious loader delivery URL
- [URL] Connected URL β hxxp://193[.]106[.]191[.]141/QWEwqdsvsf/ap.php. β C2-related connection URL
- [File Name] Cqasdqtamip.exe β 32-bit .NET loader name used in the chain
- [File Name] Wwxjdcapjnmuq.dll β Mallox ransomware payload DLL
- [File Name] Axfiysgodhtrlqmrgpchkiller.bat β Batch file dropped to stop services
- [MD5] 2456c01f5348e5c08f7e818d51862c1a, 688e0b37794395cfecaf9cc519e3c26a β Mallox Loader
- [SHA1] 625be3e4dbfb0bd35c9cda216a9bca7232dbec07, 296e19773f6fb7190d914ac556abe0125e5d7aa5 β Mallox Loader
- [SHA256] 34da973f1d154672b245f7a13e6268b4ffc88dea1ca608206b32759ec5be040c, b739be28cb9a30868112d4786bc11d37 β Mallox Loader
- [SHA256] b64606198c158f79287b215343d286adf959e89acb054f8f3db706f3c06f48aa β Mallox Payload
Read more: https://blog.cyble.com/2022/12/08/mallox-ransomware-showing-signs-of-increased-activity/