Today MalwareHunterTeam discovered a new variant of the Cryptomix Ransomware that appends the .MOLE66 extension to encrypted files, changes the contact email, and slightly changes the ransom note’s name. In the past, we used to see new Cryptomix variants a few times a month, but this time it has been almost 2 months since the previous System variant was released.
In this article I will provide a brief summary of any changes that have occurred in this new variant. As we are always looking for weaknesses, if you are a victim of this variant and decide to pay the ransom, please send us the decryptor so we can take a look at it. You can also discuss or receive support for Cryptomix ransomware infections in our dedicated Cryptomix Help & Support Topic.
Changes in the MOLE66 Cryptomix Ransomware Variant
While the encryption methods stay the same in this variant, there have been some slight differences. The ransom note is has been slightly changed to _HELP_INSTRUCTIONS_.TXT and now uses the [email protected] email for a victim to contact for payment information.
The next noticeable change is the extension appended to encrypted files. With this version, when a file is encrypted by the ransomware, it will modify the filename and then append the .MOLE66 extension to encrypted file’s name. For example, a test file encrypted by this variant has an encrypted file name of 0D0A516824060636C21EC8BC280FEA12.MOLE66.
Unfortunately, at this time the ransomware cannot be decrypted for free. As this is just a cursory analysis of this new…