Keypoints
- Crypt Ghouls targets Russian government agencies and companies across mining, energy, finance, and retail with ransomware and credential theft.
- Initial access was observed via compromised contractor VPN credentials, with VPN connections originating from a Russian hosting provider and contractor networks.
- The group uses credential-harvesting tools such as Mimikatz and XenAllPasswordPro, plus memory-dump utilities and browser data collection to capture logins and Kerberos tickets.
- Persistence and remote access were maintained using NSSM, Localtonet, AnyDesk, resocks, and PAExec, with some tooling downloaded from localtonet.com and GitHub.
- Ransomware payloads included LockBit 3.0 for Windows and Babuk for ESXi/Linux; LockBit was configured to exclude system directories and an âintelâ folder while performing destructive recycle-bin renaming.
- DLL sideloading (dismcore.dll with dism.exe) and process injection into rundll32.exe were observed, and the group abused WMI (WmiExec.py) and scheduled tasks to dump NTDS.dit and move laterally.
- Strong overlaps in tools, naming conventions, and infrastructure link Crypt Ghouls to other groups (MorLock, BlackJack, Twelve, Shedding Zmiy), suggesting shared tooling or collaboration.
MITRE Techniques
- [T1003] Credential Dumping â Used tools like Mimikatz and MiniDump Tool to extract credentials from LSASS memory, for example: âUtilized Mimikatz to extract credentials from memory.â
- [T1219] Remote Access Tools â Employed remote-access utilities to maintain interactive access, for example: âEmployed AnyDesk and Localtonet for remote access.â
- [T1486] Data Encrypted for Impact â Deployed ransomware to encrypt victim data and disrupt operations, for example: âEncrypted files using LockBit 3.0 and Babuk ransomware.â
- [T1055] Process Injection â Injected code into legitimate processes to run malicious payloads, for example: âInjected malicious code into rundll32.exe using Mimikatz.â
- [T1071] Command and Control â Communicated with external command-and-control servers to load and control payloads, for example: âUtilized C2 servers for command and control communications.â
Indicators of Compromise
- [File Hashes] Malicious binaries and loaders â 01fba22c3e6cf11805afe4ba2f7c303813c83486e07b2b418bf1b3fabfd2544e (dismcore.dll), 3edb6fb033cc00c016520e2590e2888e393ad5ed725e853eea3bc86cee3b28b8 (resocks), and other hashes such as dec147d7⌠(LockBit 3.0) and 56682344⌠(Babuk).
- [IP Addresses] C2 and VPN endpoints â 45.11.181[.]152 (netstaticpoints[.]com â CobInt C2), 169.150.197[.]10 and 169.150.197[.]18 (SurfShark VPN endpoints), 91.142.73[.]178 (VDSINA hosting).
- [File names/paths] Tool and loader locations observed on hosts â C:ProgramDataoracledismcore.dll, C:programdataallinone2023XenAllPasswordPro.exe, c:programdataintellintellpui.vbs (CobInt loader), C:UsersUserDownloadsdumper.ps1, and /tmp/lock.out (Babuk on ESXi).
- [Domains/URLs] Download and infrastructure URLs â hxxp://localtonet.com/nssm-2.24.zip, https://github.com/ip7z/7zip/releases/download/23.01/7zr.exe, and netstaticpoints[.]com referenced as a CobInt C2 domain.
In December, investigators identified an active ransomware cluster they named âCrypt Ghoulsâ that focused attacks on Russian businesses and government agencies. The groupâs operations exhibited clear links to other threat actors through shared tools, techniques, and partial infrastructure overlap, suggesting either cooperation or common access to the same toolsets.
Across multiple incidents, Crypt Ghouls relied on a toolkit composed of public and freely available utilities as well as bespoke loaders. Notable tools included Mimikatz and XenAllPasswordPro for credential harvesting, PingCastle and SoftPerfect Network Scanner for reconnaissance, Localtonet and NSSM for persistence and tunneling, resocks for proxying traffic, and remote-access software such as AnyDesk and PAExec. For final-stage impact, the actors deployed LockBit 3.0 against Windows environments and Babuk against Linux/ESXi hosts.
Where initial access could be reconstructed, attackers commonly used compromised contractor credentials to connect via VPN into victimsâ networks. Those VPN connections originated from IP ranges tied to a Russian hosting provider and contractor networks, and investigators suspect that contractors are often targeted through vulnerable VPN services or by exploiting unpatched software. To preserve access after initial compromise, the actors installed and ran NSSM to create persistent services and used Localtonet to open encrypted tunnels. Samples of these utilities were obtained from localtonet.com using URLs such as hxxp://localtonet.com/nssm-2.24.zip and hxxp://localtonet.com/download/localtonet-win-64.zip.
Credential harvesting was a major focus of the intrusions. XenAllPasswordPro was executed from several characteristic locationsâpaths like C:ProgramDataallinone2023XenAllPasswordPro.exe and similar variantsâand run under wmiprvse.exe parent processes, with artifacts consistent with Impacketâs WmiExec.py module in command-line outputs. In one case, actors deployed a CobInt backdoor via a VBScript loader, Intellpui.vbs, which executed obfuscated PowerShell and fetched a CobInt payload from a C2. In some attacks the group used RDP rather than WMI to launch XenAllPasswordPro, and in others they saved the HKLMSECURITY registry hive to a temporary file in order to access secrets managed by the Local Security Authority.
Mimikatz featured in several incidents: the utility was used to inject code into rundll32.exe and to dump LSASS memory using commands such as âsekurlsa::minidump lsass.dmpâ, enabling extraction of authenticated user credentials. The actors also ran publicly available PowerShell scripts renamed to evade detectionâfor example, an open-source Kerberos ticket dumping script was renamed to .gpo_compliance.ps1. In addition to Mimikatz and PowerShell-based dumping, the group used the MiniDump Tool (invoked as T.exe with the LSASS PID) to create process dumps; that tool generated a driver file under AppDataLocalTempkxxxxxxx.sys to read process memory and save the dump to disk.
To steal browser-stored credentials, the attackers copied Login Data files from Microsoft Edge and Google Chrome into temporary directories with commands executed via WMI. They also used PowerShell executed through wmiprvse.exe to enumerate local user accounts. On domain controllers they leveraged compromised credentials and WMI to run ntdsutil and create an NTDS.dit snapshot; this task was automated by modifying an existing scheduled task several times to create the dump, archive it using 7zr (downloaded from GitHub), and then remove the temporary folder before restoring the task to its original state. Although the attackers archived the directory containing the NTDS dump, investigators did not observe further exfiltration after archiving.
Network discovery and lateral movement were supported by tools like PingCastle (used to enumerate domain infrastructure; the sample had MD5 F4A84D6F1CAF0875B50135423D04139F) and SoftPerfect Network Scanner for port and share discovery. The Impacket WmiExec.py module and remote-execution utilities such as PAExec were used to run commands across hosts.
Infrastructure analysis revealed varied remote-access tooling and proxy usage. AnyDesk binaries and Localtonet executables were found in victim environments, and resocksâa reverse SOCKS5 proxyâwas configured to contact 91.142.73[.]178, an IP in VDSinaâs hosting network, using a connection key embedded in its parameters. Several remote-connection IPs tied to AnyDesk and Localtonet resolved to Surfshark VPN addresses, indicating the actors used VPN services to mask their connection origins.
The attackers also abused DLL sideloading by placing a legitimate dism.exe alongside a malicious dismcore.dll in C:ProgramDataoracle; the loader attempted to locate an odbcconf.xml file that would contain the payload, although that specific payload file was not recovered. For impact, the group used public ransomware builds: a LockBit 3.0 sample for Windows and Babuk for Linux/ESXi. The LockBit configuration instructed encryption of local drives, termination of specific services and processes, disabling of Windows Defender, and deletion of event logs, while excluding system folders and an âintelâ folderâwhere credential-harvesting tools had been stagedâfrom encryption. Investigators observed a destructive and unusual recycle-bin routine in which the malware encrypted files and then repeatedly renamed a file through sequences of alphabetic names (aaaaaaaaaaa -> bbbbbbbbbbb -> ⌠-> zzzzzzzzzzz) before attempting to delete the last version, a behavior that makes file recovery extremely difficult.
After encryption, the attackers left a ransom note linking to a Session messaging contact containing an attacker ID. Session provides end-to-end encryption and has been used previously by other ransomware operations such as GhostLocker, SEXi, and MorLock. Against ESXi servers, the actors uploaded a Babuk binary via SSH and ran commands like â/tmp/lock.out â/vmfs/volumes/[redacted]’â to encrypt virtual machine files, indicating an intention to disrupt core business operations in addition to monetary extortion.
There are strong overlaps between Crypt Ghouls and several other groups active against Russian targets. MorLock, as documented by F.A.C.C.T., shares many tools (SoftPerfect Network Scanner, XenAllPasswordPro, AnyDesk, PingCastle, Localtonet, NSSM, resocks, LockBit 3.0, Babuk) and even naming conventions for resocks binaries (e.g., âxfs-healthcheckâ) and the âallinone2023â directory used for XenAllPasswordPro. BlackJack and Twelve have also been observed using XenAllPasswordPro, and the Intellpui.vbs CobInt loader seen in a Crypt Ghouls incident was previously associated with Twelve. Shedding Zmiy (linked to the (Ex)Cobalt cluster) has used DLL sideloading with dismcore.dll and hosted C2 on VDSina, echoing elements found in Crypt Ghouls activity. These commonalities suggest resource sharing, reuse of leaked or publicly available tooling, or collaboration among different actors, complicating attribution efforts.
Victims attributed to Crypt Ghouls include Russian government entities and companies across mining, energy, finance, and retail sectors. In conclusion, Crypt Ghouls represents another actor in a broader pattern of attacks that leverage compromised subcontractor credentials and widely available offensive tools and ransomware builds. Because many groups are using leaked or publicized ransomware code and overlapping toolchains, distinguishing individual perpetrators is increasingly difficult; the shared toolkit and infrastructure elements imply either cooperation or a marketplace-driven reuse of capabilities among multiple actors.
Read more: https://securelist.com/crypt-ghouls-hacktivists-tools-overlap-analysis/114217/