[UPDATED 2/16/23 9:48 AM to include IOCs]
A new variant of Xortist named “MortalKombat” in tandem with Laplas clipper has been reported by Cisco Talos. This variant was first discovered in January 2023. Talos has reported that this form of ransomware is not as complicated as other strains as the encryption mechanism does not target specific files, but rather encrypts system, application and user data. Attackers traditionally avoid this method to prevent the system from becoming unstable and losing their foot hold. The reported initial compromise is derived from a phishing campaign that has a malicious compressed file containing a BAT script that calls a secondary payload to download and execute. When executed the script purges these downloaded files to prevent detection.
Once the system starts encrypting, the user’s desktop will be changed to a ransom note that has been adorned with artwork from the popular long running video game Mortal Kombat.
Additionally, the ransomware modifies the registry (a Run key called “Alcmeter”) for persistence. HKEY_CLASSES_ROOT keys are also deleted causing applications to become inoperable.
“MortalKombat did not show any wiper behavior or delete the volume shadow copies on the victim’s machine. Still, it corrupts Windows Explorer, removes applications and folders from Windows startup, and disables the Run command window on the victim’s machine, making it inoperable,”-Cisco Talos
Indicators of Compromise that have been identified include the following:
SHA-256 Hash | Description |
f02512e7e2950bdf5fa0cd6fa6b097f806e1b0f6a25538d3314c793998484220 | BAT file |
e5f60df786e9da9850b7f01480ebffced3be396618c230fa94b5cbc846723553 | EXE |
9a5a5d50dea40645697fabc8168cc32faf8e71ca77a2ea3f5f73d1b9a57fc7b0 | ZIP |
63ec10e267a71885089fe6de698d2730c5c7bc6541f40370680b86ab4581a47d | EXE |
26d870d277e2eca955e51a8ea77d942ebafbbf3cbf29371a04a43cfe1546db17 | ZIP |
1bf30c5c51a3533b4f0d7d3d560df691657d62374441d772f563376b55a60818 | BAT file |
db7db0e38e9ab3e5e7a2b9c3bd7244f4f2221d6fef4b9c2b51e4a8ff6aea925c | N/A |
IPv4 | |
144.76.136[.]153 | ATTACKER: Scanning Host |
193.169.255[.]78 | ATTACKER: Malware Hosting |
hack3dlikeapro@proton[.]me | ATTACKER: Phishing |
https://blog.talosintelligence.com/new-mortalkombat-ransomware-and-laplas-clipper-malware-threats/
https://otx.alienvault.com/pulse/63ebcd7ed463e232591fa655
