2023 Dec. – Threat Trend Report on Ransomware Statistics and Major Issues
This report provides statistics on the number of new ransomware samples, targeted systems, and targeted businesses in December 2023, as well as notable ransomware issues in Korea and other countries
Statistics
The total number of new ransomware samples collected during the past six months is as follows.

Figure 1. Number of new ransomware samples
Key Trends
Multiple issues regarding various ransomware occurred in December 2023. This report presents brief introductions to the following key topics and details for reference. Additionally, ransomware-related topics that had not been covered before were given a high priority when selecting issues for the end section.
- Recent activities and changes in Mallox ransomware
- CISA cybersecurity advisory on Play ransomware
- Linux version of Qilin ransomware targets VMware ESXi
Readers are recommended to check and refer to issues that are not covered in this report through ATIP if the current security management system or situation requires so.
1) Recent Activities and Changes in Mallox Ransomware
SentinelOne uploaded a blog post titled “Mallox Resurrected | Ransomware Attacks Exploiting MS-SQL Continue to Burden Enterprises” on December 13th, which covers the analysis of and responses to Mallox’s recent activities, initial access methods, and payloads.[1]
Mallox is a closed ransomware group consisting of a small number of members which was first reported as TargetCompany ransomware around June 2021. In late 2022, the gang was also called FARGO ransomware because “.FARGO” was added to the file extensions of encrypted files. Targets of initial infiltration were mainly externally exposed vulnerable MS-SQL or MySQL servers. If these servers have inappropriate account information and passwords, they can be breached through brute force and dictionary attacks. The Mallox group is known to avoid approaches that require interaction with the target such as deceiving victims into executing the malware for initial infiltration. Thus it is believed that it exploits vulnerable servers or vulnerabilities for initial access. The group is known to exclude Kazakhstan, Russia, Qatar, and Ukraine from its attacks and to only be motivated by financial gains through ransomware without political motives.
Please refer to the following TA introduction and links to related reports for previous information and analysis details on the Mallox ransomware gang.
- atip.ahnlab.com: Threat Actors – Mallox ransomware
- atip.ahnlab.com: Mallox Ransomware Gang Designates a Korean Semiconductor Parts Company as a Victim
- asec.ahnlab.com: Mallox Ransomware Being Distributed in Korea
- atip.ahnlab.com: Fileless Method Used to Attack MS-SQL Servers
- asec.ahnlab.com: Analysis of Ransomware With BAT File Extension Attacking MS-SQL Servers (Mallox)
According to the SentinelOne blog, the following changes were observed to the known information on the Mallox ransomware covered above.
- Runs as a Ransomware-as-a-Service (RaaS) threat model
- Recruits affiliates through underground forums and markets such as Nulled and RAMP
- Uses phishing emails to send attack frameworks such as Cobalt Strike and Sliver
- Changed the ransom note file name to “HOW TO BACK FILES.TXT”
- Changed the contact email in the ransom note to “mallox.resurrection@onionmail.org”
- Besides the ransom note, also creates a file named “Targetinfo.txt” in the execution folder
A brief examination of changes to the behaviors and characteristics of Mallox will be given based on the sample used for initial infiltration shared by SentinelOne and a Mallox ransomware sample.
- 3d434b7cc9589c43d986bf0e1cadb956391b5f9a updt.ps1
- 9295a02c49aa50475aa7876ca80b3081a361ff7d updt.ps1
- 3fa79012dfdac626a19017ed6974316df13bc6ff Bwmeldokiller.bat
- 7e7957d7e7fd7c27b9fb903a0828b09cbb44c196 Kill-Delete.bat
- 2c49fa21b0a8415994412fe30e023907f8a7b46e Mallox Ransomware Payloads – 32bit (Previous)
- 9d182e17f88e26cb0928e8d07d6544c2d17e99f5 Mallox Ransomware Payloads – 64bit (New)
- …
[1] https://www.sentinelone.com/blog/mallox-resurrected-ransomware-attacks-exploiting-ms-sql-continue-to-burden-enterprises/