MegaCortex

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
MegaCortex is a type of malware known for its harmful effects on computer systems and devices. It was identified by Dragos, a cybersecurity firm, as having a relationship with another ransomware called EKANS. Both MegaCortex and EKANS have specific characteristics that pose unique risks to industrial operations not previously observed in ransomware operations. They represent hardened ransomware variants that can disrupt operations, steal personal information, or hold data hostage for ransom. Over the years, MegaCortex has been used in various cyberattacks, paralyzing major corporations' operations. In addition to MegaCortex, other ransomware such as LockerGoga, Hive, and Dharma were also deployed by cybercriminals to carry out their attacks. These criminals targeted large corporations in 71 countries, causing losses of several hundred million euros. Qakbot, also known as Qbot and Pinkslipbot, served as an initial infection vector for various ransomware gangs, including those using MegaCortex. After remaining undetected in compromised systems for months, these criminals would deploy different types of ransomware and present a ransom note to the victims, demanding payment in Bitcoin in exchange for decryption keys. However, there has been some success in combating MegaCortex and similar ransomware. Last year, decryptors for BlackCat, Hive, and MegaCortex ransomware variants were released, providing a means to recover encrypted files without paying a ransom. Additionally, Swiss authorities, along with No More Ransom and cybersecurity firm Bitdefender, developed decryption tools for LockerGoga and MegaCortex ransomware variants. This progress followed the arrest in Ukraine of five members of a group accused of using ransomware strains like Hive, LockerGoga, MegaCortex, and Dharma in attacks that netted them hundreds of millions of dollars.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
EKANS
1
EKANS, also known as SNAKE (the word EKANS spelled backwards), is a significant strain of malware that emerged in mid-December 2019. It was one of the more concerning ransomware strains observed in 2020, accounting for 6% of all ransomware attacks monitored by IBM Security X-Force in that year. The
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Malware
Ransom
Police
Botnet
Encryption
Encrypt
Ics
Windows
Dragos
Bitcoin
Ibm
Fbi
Trojan
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
LockerGogaUnspecified
7
LockerGoga is a type of malware, specifically ransomware, known for its disruptive capabilities. It was notably deployed at Norsk Hydro in March 2019, causing significant operational disruption. LockerGoga differentiates itself from other types of ransomware such as EKANS due to its destructive natu
HiveUnspecified
4
Hive is a malicious software, or malware, that infiltrates systems to exploit and damage them. This malware has been associated with Volt Typhoon, who exfiltrated NTDS.dit and SYSTEM registry hive to crack passwords offline. The Hive operation was primarily involved in port scanning, credential thef
REvilUnspecified
4
REvil is a notorious form of malware, specifically ransomware, that infiltrates systems to disrupt operations and steal data. The ransomware operates on a Ransomware as a Service (RaaS) model, which gained traction in 2020. In this model, REvil, like other first-stage malware such as Dridex and Goot
QakBotUnspecified
3
Qakbot is a potent malware, a malicious software designed to exploit and damage computer systems. It can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it has the potential to steal personal information, disrupt operations, or e
Black BastaUnspecified
3
Black Basta is a notorious malware entity known for its devastating ransomware attacks. First emerging in June 2022, the group has since been associated with a series of high-profile cyber-attacks worldwide. This malware, like others, infiltrates systems through suspicious downloads, emails, or webs
EgregorUnspecified
2
Egregor is a variant of the Sekhmet ransomware and operates as Ransomware-as-a-Service (RaaS). It emerged in 2020, suspected to be from former Maze affiliates. Known for its double extortion tactics, Egregor publicly shames its victims by leaking sensitive data if the ransom isn't paid. In one notab
QbotUnspecified
2
Qbot, also known as Qakbot or Pinkslipbot, is a modular information-stealing malware that emerged in 2007 as a banking trojan. Over the years, it has evolved into an advanced malware strain used by multiple cybercriminal groups to compromise networks and prepare them for ransomware attacks. The firs
PinkslipbotUnspecified
1
Pinkslipbot, also known as Qakbot, QBot or QuackBot, is a modular information-stealing malware that has been active since 2008. Initially emerging in 2007 as a banking trojan, it targeted financial institutions to steal sensitive data. Over the years, however, its functionality evolved and diversifi
ProLockUnspecified
1
ProLock is a type of malware, specifically ransomware, that is designed to infiltrate computer systems, often unbeknownst to the user. It typically enters systems through suspicious downloads, emails, or websites. Once inside, ProLock can steal personal information, disrupt operations, and hold data
RyukUnspecified
1
Ryuk is a sophisticated malware, specifically a ransomware variant, that has been extensively used by cybercriminal group ITG23. The group has been employing crypting techniques for several years to obfuscate their malware, with Ryuk often seen in tandem with other malicious software such as Trickbo
LockbitUnspecified
1
LockBit is a type of malware, specifically ransomware, that infiltrates systems to exploit and damage them. It can enter your system through various channels such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt
DoppelpaymerUnspecified
1
DoppelPaymer is a form of malware, specifically ransomware, known for its high-profile attacks on large organizations and municipalities. Originally based on the BitPaymer ransomware, DoppelPaymer was reworked and renamed by the threat group GOLD HERON, after initially being operated by GOLD DRAKE.
ContiUnspecified
1
Conti is a type of malware, specifically ransomware, known for its ability to disrupt operations, steal personal information, and hold data hostage for ransom. The malicious software infiltrates systems via suspicious downloads, emails, or websites, often unbeknownst to the user. It has been used in
BlackbastaUnspecified
1
BlackBasta is a malicious software (malware) known for its disruptive and damaging effects on computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even ho
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
ITG08Unspecified
1
ITG08 is a notable threat actor in the cybersecurity landscape, known for its malicious activities and strategic partnerships with other threat actors. This group has been linked to a series of attacks through Tactics, Techniques, and Procedures (TTPs) consistent with their known modus operandi. Whi
BianlianUnspecified
1
BianLian is a threat actor that has been increasingly active in cybercrimes. The group is known for its malicious activities, including the execution of actions with harmful intent. In a series of recent events, BianLian has exploited vulnerabilities in JetBrains TeamCity, a continuous integration a
AlphvUnspecified
1
AlphV, also known as BlackCat, is a notable threat actor in the cybersecurity landscape. This group has been involved in numerous high-profile attacks, including stealing 5TB of data from Morrison Community Hospital and compromising Clarion, a global manufacturer of audio and video equipment for car
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Lockergoga Md5Unspecified
1
None
Source Document References
Information about the MegaCortex Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
7 months ago
Decryptor Issued For Babuk Tortilla Ransomware Variant | #ransomware | #cybercrime | National Cyber Security Consulting
CERT-EU
7 months ago
The law enforcement operations targeting cybercrime in 2023
CERT-EU
8 months ago
More than $100 million in ransom paid to Black Basta gang over nearly 2 years | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
DARKReading
8 months ago
Ringleader of Prolific Ransomware Gang Arrested in Ukraine
Securityaffairs
8 months ago
International police operation dismantled prominent Ukraine-based Ransomware group
CERT-EU
8 months ago
Ringleader of Ransomware Group in Ukraine Arrested: Europol
CERT-EU
8 months ago
Europol shutters ransomware operation with kingpin arrests
BankInfoSecurity
8 months ago
Police Bust Suspected Ransomware Group Ringleader in Ukraine
InfoSecurity-magazine
8 months ago
Ukraine Police Dismantle Major Ransomware Group
CERT-EU
10 months ago
Qakbot Takedown Resembles Hack Back, Will Botnet, Malware Be Resurrected?
CERT-EU
a year ago
Operation Duck Hunt: Multinational Operation Dismantles Qakbot Botnet - IT Governance USA Blog
CERT-EU
a year ago
Free Decryptor Available for ‘Key Group’ Ransomware
CERT-EU
a year ago
Qakbot Botnet Disrupted, Infected 700,000 Computers Globally
CERT-EU
a year ago
Qakbot Cracked: FBI and Friends Hack the Hackers
InfoSecurity-magazine
a year ago
FBI-Led Operation Duck Hunt Shuts Down QakBot Malware
CERT-EU
a year ago
FBI and European partners dismantle global malware network
CERT-EU
a year ago
International police operation dismantles notorious Quakbot botnet
Flashpoint
a year ago
COURT DOC: Qakbot Malware Disrupted in International Cyber Takedown
CERT-EU
a year ago
Multinational Operation Disrupts QakBot Botnet
CERT-EU
a year ago
How the FBI nuked Qakbot malware from infected Windows PCs