Fatality!  Ransomware Enters the Mortal Kombat Tournament

Share This Post

[UPDATED 2/16/23 9:48 AM to include IOCs]

A new variant of Xortist named “MortalKombat” in tandem with Laplas clipper has been reported by Cisco Talos. This variant was first discovered in January 2023. Talos has reported that this form of ransomware is not as complicated as other strains as the encryption mechanism does not target specific files, but rather encrypts system, application and user data. Attackers traditionally avoid this method to prevent the system from becoming unstable and losing their foot hold. The reported initial compromise is derived from a phishing campaign that has a malicious compressed file containing a BAT script that calls a secondary payload to download and execute. When executed the script purges these downloaded files to prevent detection.

Once the system starts encrypting, the user’s desktop will be changed to a ransom note that has been adorned with artwork from the popular long running video game Mortal Kombat.

Additionally, the ransomware modifies the registry (a Run key called “Alcmeter”) for persistence. HKEY_CLASSES_ROOT keys are also deleted causing applications to become inoperable.

“MortalKombat did not show any wiper behavior or delete the volume shadow copies on the victim’s machine. Still, it corrupts Windows Explorer, removes applications and folders from Windows startup, and disables the Run command window on the victim’s machine, making it inoperable,”-Cisco Talos

Indicators of Compromise that have been identified include the following:

SHA-256 HashDescription
f02512e7e2950bdf5fa0cd6fa6b097f806e1b0f6a25538d3314c793998484220BAT file
e5f60df786e9da9850b7f01480ebffced3be396618c230fa94b5cbc846723553EXE
9a5a5d50dea40645697fabc8168cc32faf8e71ca77a2ea3f5f73d1b9a57fc7b0ZIP
63ec10e267a71885089fe6de698d2730c5c7bc6541f40370680b86ab4581a47dEXE

26d870d277e2eca955e51a8ea77d942ebafbbf3cbf29371a04a43cfe1546db17
ZIP

1bf30c5c51a3533b4f0d7d3d560df691657d62374441d772f563376b55a60818
BAT file

db7db0e38e9ab3e5e7a2b9c3bd7244f4f2221d6fef4b9c2b51e4a8ff6aea925c
N/A
IPv4
144.76.136[.]153ATTACKER:
Scanning Host

193.169.255[.]78
ATTACKER:
Malware Hosting
Email

hack3dlikeapro@proton[.]me
ATTACKER:
Phishing

https://www.bleepingcomputer.com/news/security/new-mortalkombat-ransomware-targets-systems-in-the-us/

https://blog.talosintelligence.com/new-mortalkombat-ransomware-and-laplas-clipper-malware-threats/

https://otx.alienvault.com/pulse/63ebcd7ed463e232591fa655



Reach out to our incident response team for help

More To Explore

Information Security News – 4/14/2025

Oracle Confirms “Obsolete Servers” Hacked Article link: https://www.bleepingcomputer.com/news/security/oracle-says-obsolete-servers-hacked-denies-cloud-breach/    Phishing Kits Now Vet Victims in Real-Time Before Stealing Credentials Article link: https://www.bleepingcomputer.com/news/security/phishing-kits-now-vet-victims-in-real-time-before-stealing-credentials/    Neptune RAT

Information Security News – 4/7/2025

Criminal Group Claims Responsibility for Cyberattack on Minnesota Casino Article Link: https://cdcgaming.com/brief/cybersecurity-incident-at-minnesota-tribal-community-casino-prompts-shutdown/ As CISA Downsizes, Where Can Enterprises Get Support? Article Link: https://www.darkreading.com/cybersecurity-operations/roundtable-cisa-downsizes-where-can-enterprises-look-support Oracle Privately

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.