IBM X-Force reports that RansomExx has been rewritten in Rust as RansomExx2, targeting Linux with a Windows variant likely in development. The rewrite highlights Rust’s cross-platform appeal and the ransomware’s continued use of AES-256 encryption with RSA-protected keys. #RansomExx2 #Rust #DefrayX #Hive0091 #PyXie #Vatet #RansomExx #XForce
Keypoints
- RansomExx2 is a Rust-based rewrite of the RansomExx ransomware, designed to run on Linux with a Windows version likely in the works.
- DefrayX threat actor group (Hive0091), known for PyXie, Vatet loader, and Defray ransomware, operates RansomExx2.
- RansomExx2 encrypts files using AES-256 with RSA protecting the encryption keys; the RSA public key is embedded in the binary and the private key is held by the attacker.
- The malware requires a list of target directories provided via the command line to encrypt, and will not encrypt anything if no arguments are supplied.
- During encryption, files ≥40 bytes are processed, ransom notes are dropped in each directory, and a new file extension is assigned to encrypted files.
- Elements such as RSA key, file extension, and ransom note name are themselves encrypted within the binary and decrypted by XOR, as an obfuscation/defense-evasion measure.
- The article notes a rising trend of ransomware developers adopting Rust for cross‑platform support and lower AV detection, with X-Force predicting more Rust-based variants from major families.
MITRE Techniques
- [T1059.003] Command-Line – The ransomware expects to receive a list of target directories to encrypt as input. Quote relevant content: ‘The ransomware expects to receive a list of directory paths to encrypt as input.’
- [T1083] File and Directory Discovery – It enumerates and encrypts files in the specified directories. Quote relevant content: ‘enumerating and encrypting files.’
- [T1486] Data Encrypted for Impact – It encrypts files using AES-256 and protects the keys with RSA. Quote relevant content: ‘Files are encrypted using AES-256 and a randomly generated key. The AES key is itself encrypted using RSA and a hardcoded public key, and appended to the end of the encrypted file.’
- [T1577] Crypto: Public-Key Cryptography – RSA public key is used to protect the encryption keys; the attacker holds the private key. Quote relevant content: ‘The AES key is itself encrypted using RSA and a hardcoded public key, and appended to the end of the encrypted file.’
- [T1027] Obfuscated/Compressed Files and Information – Elements such as RSA key, file extension, and ransom note name and contents are encrypted within the binary and decrypted by xoring the encrypted data with an equal-sized key. Quote relevant content: ‘Elements such as RSA key, file extension, and the ransomware note name and contents, are encrypted within the binary and decrypted by xoring the encrypted data with an equal-sized key.’
Indicators of Compromise
- [IOC Type] None identified – No IPs, domains, or file hashes are disclosed in the article.
Read more: https://securityintelligence.com/posts/ransomexx-upgrades-rust/