The Emergence of Mallox v1.0

September 25, 2024

Introduction  

In a surprising turn of events, Kryptina, a once-overlooked ransomware tool has resurfaced as a key player in enterprise cyber-attacks. Being a Ransomware-as-a-Service (RaaS) platform, it has been adopted by "Target company", the affiliates of the notorious Mallox ransomware group, highlighting the evolving nature of cybercrime.

Initially released in December 2023, Kryptina's popularity waned among cybercriminals. However, a recent data leak exposed its use by a Mallox ransomware group affiliates have adopted and modified Kryptina to launch Linux-based ransomware campaigns.

Labeled as "Mallox v1.0," this updated version of Kryptina preserves its original functionalities while removing its previous branding, underscoring the increasing commoditization of ransomware tools in the cybercriminal ecosystem. This report explores the emergence of Mallox v1.0, its utilization of Kryptina’s core capabilities, and the broader impact on enterprise cybersecurity defenses.  

The Kryptina-Mallox Connection

Mallox, is a well-established ransomware-as-a-service (RaaS) operation that has been targeting enterprises since 2021. Renowned for its opportunistic approach, Mallox often exploits recently disclosed vulnerabilities, such as those affecting Microsoft SQL Server, to gain initial access to target systems.  

Mallox ransomware has targeted a variety of countries and industries, demonstrating its indiscriminate approach to victims. Some notable examples include India, France, Portugal, Saudi Arabia, the United States, Brazil, and other nations. This ransomware has affected organizations in manufacturing, food and beverage, retail, transportation, government, IT, media and entertainment, business services, education, and consulting.

In December 2023, a new RaaS tool, Kryptina, was introduced by an entity named “Corlys” for $500, which later increased to $800. However, in February 2024, Corlys abruptly ceased sales and released the full source code of Kryptina on BreachForums, making it accessible to a wider range of cybercriminals.  

A staging server, set up by a Mallox affiliate, was discovered in May 2024. This server contained a collection of tools and resources used for the group's ransomware operations, including payloads and builder tools.  

The compromised staging server, located at 185[.]73[.]125[.]6, contained a variety of resources related to the Mallox ransomware operation. These resources included archives and payloads specifically designed for the Windows version of Mallox. Surprisingly, the server also hosted the modified source code for Kryptina, the ransomware-as-a-service platform. This suggests that the affiliate had access to and modified the Kryptina platform to create their own Linux-based variant of Mallox.  

It's important to note that this particular Mallox affiliate appears to be the only one using Kryptina. Other Linux variants of Mallox are not based on this platform, further complicating the understanding of the relationship between Mallox and Kryptina.  

This suggests that the Mallox affiliate merely altered the branding and name, stripping away any references to Kryptina in ransom notes, scripts, and files, while simplifying the original documentation into a "lite" version, leaving the core functionality intact.

Despite rebranding efforts, the Mallox affiliate's ransomware tool retains many of the core elements of Kryptina. The ransom note templates, originally designed for Kryptina, have been modified to remove references to the platform and replace them with "Mallox v1.0."

The original scripting_demo.py file in Kryptina offered threat actors a streamlined method for building Linux payloads directly via the command line, with a template that includes all necessary fields. This enables rapid, automated payload creation. Although these scripted builds don’t appear in the web UI, the script remains a valuable tool for threat actors aiming to automate and expedite the creation of new builds over time. The scripting_demo.py file has only undergone minor updates, primarily to rebrand it under Mallox instead of Kryptina.

Technical Analysis

Both Kryptina and Mallox offer a variety of build modes, including:  

Additionally, both tools allow for customization of various parameters, such as:  

Victim-Specific Payload Configuration

The May 2024 affiliate leak revealed output folders for 14 potential ransomware targets, each with a unique subfolder. Some folders contain config.json files along with corresponding encryptor/decryptor binaries, while others are empty, indicating incomplete payloads. The configuration files include fields for payment type, addresses, encryption keys, and ransom note templates. Seven subfolders have completed payloads with all targets sharing the same Bitcoin address (BTC 18CUq89XR81Y7Ju2UBjER14fYWTfVwpGP3) and other repeated values like "key," "bitcoin," and the extension .lmallox.  

Image representing content present on the affiliate leak site
Source:Sentinel Labs

Beyond the Linux-based Mallox 1.0 ransomware, the affiliate's server revealed a diverse array of tools and resources. These included a tool to potentially disable Kaspersky security, exploit code for CVE-2024-21338, a Windows privilege escalation vulnerability, PowerShell scripts for elevating privileges, Java-based applications for delivering the Mallox payload, disk image files containing payloads for various system architectures, and folders containing configuration data for 14 potential victims. This demonstrates the affiliate's comprehensive toolkit for targeting both Linux and Windows systems and their ability to leverage a variety of techniques to gain initial access and escalate privileges.

MITRE ATT&CK TACTICS AND TECHNIQUES  

ID Technique
T1190 Exploit Public-Facing Application
T1078.001 Valid Accounts: Default Accounts
T1059.006 Command and Scripting Interpreter: Python
T1068 Exploitation for Privilege escalation
T1562.001 Disable or modify tools
T1070.004 File deletion
T1110 Brute Force
T1135 Network Share Discovery
T1020 Automated exfiltration
T1486 Data Encrypted for Impact
T1490 Inhibit System Recovery

Conclusion

The Kryptina-based Mallox variants are affiliate-specific and separate from other Linux versions, illustrating the increasing complexity of ransomware ecosystems. Originally a free, underutilized RaaS tool, Kryptina’s adoption by Mallox affiliates signals a significant enhancement for the group and underscores the growing trend of ransomware commoditization.

Sources Cited:  

  1. https://www.sentinelone.com/labs/kryptina-raas-from-unsellable-cast-off-to-enterprise-ransomware/  
  2. https://www.infosecurity-magazine.com/news/kryptina-ransomware-resurfaces/  
  3. https://www.infosecurity-magazine.com/news/mallox-ransomware-deployed-via-ms/  
  4. https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-targetcompany  
  5. https://securelist.com/mallox-ransomware/113529/  
  6. https://www.blackhatethicalhacking.com/news/mallox-ransomware-targets-linux-systems-with-modified-kryptina-code/
  7. https://www.rewterz.com/threat-advisory/new-linux-version-of-mallox-ransomware-based-on-leaked-kryptina-code-active-iocs
  8. https://cybersecsentinel.com/mallox-ransomware-expands-targeting-to-linux-systems/

About Loginsoft

For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science & AI, etc.

Expertise in Integrations with Threat Intelligence and Security Products: Built more than 250+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar & Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc.

In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions.

Interested to learn more? Let’s start a conversation.

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

BLOGS AND RESOURCES

Latest Articles