Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

TargetCompany/Mallox Ransomware (.tohnichi, .mallox, .xollam) Support Topic


  • Please log in to reply
294 replies to this topic

#31 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 20 February 2022 - 09:57 PM

This looks like the ransom note contents we have seen with Maoloa-Alco Ransomware
 
Maoloa-Alco Ransomware typically will leave files (ransom notes) named HOW BACK YOUR files.txt, !INSTRUCTI0NS!.TXT, HOW TO BACK YOUR FILES.txt, !!! HOW TO BACK YOUR FILES !!!.TXT . Some of the newer variants include a special file named ids.txt or a .TXT file with hexadecimal characters such as .DF7ADA61E0284DDD4F1E, .BFC0E91B00AE8A0620D3, .C4D1664EF40CE18F8D41 in the C:\Users\User\AppData\Local\Temp folder and C:\Users\User\Desktop\.
 
What did ID Ransomware (IDR) say?


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


BC AdBot (Login to Remove)

 


#32 xuedj

xuedj

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 20 February 2022 - 10:03 PM

This looks like the ransom note contents we have seen with Maoloa-Alco Ransomware
 
Maoloa-Alco Ransomware typically will leave files (ransom notes) named HOW BACK YOUR files.txt, !INSTRUCTI0NS!.TXT, HOW TO BACK YOUR FILES.txt, !!! HOW TO BACK YOUR FILES !!!.TXT . Some of the newer variants include a special file named ids.txt or a .TXT file with hexadecimal characters such as .DF7ADA61E0284DDD4F1E, .BFC0E91B00AE8A0620D3, .C4D1664EF40CE18F8D41 in the C:\Users\User\AppData\Local\Temp folder and C:\Users\User\Desktop\.
 
What did ID Ransomware (IDR) say?

My desktop left this TXT document "RECOVERY INFORMATION".



#33 xuedj

xuedj

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 20 February 2022 - 10:06 PM

This looks like the ransom note contents we have seen with Maoloa-Alco Ransomware
 
Maoloa-Alco Ransomware typically will leave files (ransom notes) named HOW BACK YOUR files.txt, !INSTRUCTI0NS!.TXT, HOW TO BACK YOUR FILES.txt, !!! HOW TO BACK YOUR FILES !!!.TXT . Some of the newer variants include a special file named ids.txt or a .TXT file with hexadecimal characters such as .DF7ADA61E0284DDD4F1E, .BFC0E91B00AE8A0620D3, .C4D1664EF40CE18F8D41 in the C:\Users\User\AppData\Local\Temp folder and C:\Users\User\Desktop\.
 
What did ID Ransomware (IDR) say?

1 Result
TargetCompany
 This ransomware may be decryptable under certain circumstances.

Please refer to the appropriate guide for more information.

Identified by

  • ransomnote_email: recohelper@cock.li

 

Click here for more information about TargetCompany


#34 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 20 February 2022 - 10:40 PM

It looks like IDR made the detection based on the ransom note email. We will need to wait for Demonslay335 to review this information.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#35 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,049 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:07 AM

Posted 21 February 2022 - 01:26 AM

 
Such elements were used by them from October to January. They have long departed from using the name of the affected company and are confusing.
 
The extension can now be anything, and the pattern can be written like this:
.<target_company>
.<target_pc>
.<known_name>
It probably won't last long and they will change the extension again soon.

Edited by Amigo-A, 21 February 2022 - 01:48 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#36 xuedj

xuedj

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 21 February 2022 - 01:50 AM

 

 
Such elements were used by them from October to January. They have long departed from using the name of the affected company and are confusing.
 
The extension can now be anything, and the pattern can be written like this:
.<target_company>
.<target_pc>
.<known_name>
It probably won't last long and they will change the extension again soon.

 

Is there any chance of decryption



#37 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,049 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:07 AM

Posted 21 February 2022 - 03:29 AM

As you know, Avast released a decryptor, but now the version of the ransomware-encryptor may already be different.


My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#38 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 21 February 2022 - 09:37 AM

@xuedj

 

Since the infection has been confirmed, your topic has been merged with the primary support topic.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#39 cybercynic

cybercynic

  •  Avatar image
  • Members
  • 2,073 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:07 AM

Posted 21 February 2022 - 11:00 AM

  I used the "avast_decryptor_targetCompany64" tool to decrypt it. After the third step, I have to enter a password to proceed to the next step, but I have not decrypted it before, so there is no password,

You just click on "Next" and go from there. 


 


#40 xuedj

xuedj

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 21 February 2022 - 07:12 PM

 

  I used the "avast_decryptor_targetCompany64" tool to decrypt it. After the third step, I have to enter a password to proceed to the next step, but I have not decrypted it before, so there is no password,

You just click on "Next" and go from there. 

 

The next button is no longer clickable, probably because there is no such extension in the decryptor, so it is not regarded as an encrypted file



#41 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,818 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:07 AM

Posted 21 February 2022 - 07:16 PM

It may not be a supported extension. It is not uncommon for some ransomware decrypters to work only on certain extensions pertaining to a specific ransomware.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#42 xuedj

xuedj

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 21 February 2022 - 10:44 PM

It may not be a supported extension. It is not uncommon for some ransomware decrypters to work only on certain extensions pertaining to a specific ransomware.

After decryption, what can I do to prevent it from being hacked again? I'm going to format the hard disk, redo the RAID and install the system, ok? Could this ransomware be in memory? I'll re-hack the system when I'm done installing it. Is there any way to clean up the memory as well?



#43 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,049 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:07 AM

Posted 22 February 2022 - 02:56 AM

After decryption, what can I do to prevent it from being hacked again? I'm going to format the hard disk, redo the RAID and install the system, ok?

 

There cannot be a clear answer here.
Security depends on many factors, for the most part, you must analyze errors yourself and eliminate vulnerabilities in PC and network security.
---
In cases of ransomware attacks, the use of RAID shows all its uselessness. Both drives now have the same encrypted files instead of the originals.
It may be better to abandon such a scheme and divide the disks in order to store the most valuable files on the second disk, which should be unplugged most of the time.

Edited by Amigo-A, 22 February 2022 - 03:01 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#44 xuedj

xuedj

  •  Avatar image
  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:07 PM

Posted 22 February 2022 - 04:09 AM

 

After decryption, what can I do to prevent it from being hacked again? I'm going to format the hard disk, redo the RAID and install the system, ok?

 

There cannot be a clear answer here.
Security depends on many factors, for the most part, you must analyze errors yourself and eliminate vulnerabilities in PC and network security.
---
In cases of ransomware attacks, the use of RAID shows all its uselessness. Both drives now have the same encrypted files instead of the originals.
It may be better to abandon such a scheme and divide the disks in order to store the most valuable files on the second disk, which should be unplugged most of the time.

 

ok,Thank you for your advice, later I regularly do cold backup process to reduce the loss



#45 imhungry

imhungry

  •  Avatar image
  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 08 March 2022 - 06:18 AM

Hello. This is my first post here. I need help about this ransomware. That hacker made another ransomwares before. I searched and find a ransomware name with ".mallox" and ı think this is a new ransomware from the same hacker. I looking a solution for hours. I looked everywhere. And ı cannot find a solutions. I'm uploading an example file and the hacker's note and waiting for help. I'cant attach files from here I think because of permissions. Thank you.

 

example file and hackers note:

 

https://s7.dosya.tc/server21/t6fkzk/RECOVERY_INFORMATION.rar.html

 

 






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users