Site icon TheCyberThrone

HelloXD Ransomware plants Backdoor

Advertisements

The HelloXD ransomware targeting Windows and Linux systems with the infections also involving the deployment of a backdoor to facilitate persistent remote access to infected hosts.

The operators employed the open-source backdoor Micro Backdoor to maintain persistence on infected hosts. It allows the attacker to browse the file system, upload and download files, execute commands, and remove itself from the infected system.

The analysis of the Micro Backdoor sample revealed an embedded IP address in the configuration, the IP belongs to a threat actor that is likely the developer: x4k (aka L4ckyguy, unKn0wn, unk0w, _unkn0wn, and x4kme).

The researchers discovered that the operators used two main packers for HelloXD ransomware binaries, a modified version of UPX, and a second packer consisting of two layers, with the second being the same custom UPX packer.

Researchers have observed two different samples of the HelloXD ransomware publicly available, a circumstance that suggests the malware is still under development.

Unit 42 research encountered HelloXD, a ransomware family in its initial stages – but already intending to impact organizations. While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k. This threat actor is well known on various hacking forums and seems to be of Russian origin.

Threat Analysis – Report Statement

Unit 42 was able to uncover additional x4k activity being linked to malicious infrastructure, and additional malware besides the initial ransomware sample, going back to 2020.

Indicators of Compromise

HelloXD Ransomware samples

Malware linked to x4k infrastructure

x4k Infrastructure

Exit mobile version