A newly recognized ransomware marketing campaign has emerged, seemingly concentrating on supporters of Elon Musk by a extremely refined phishing-based assault.
Cybersecurity researchers have uncovered a multi-stage an infection chain that begins with a misleading PDF doc titled “Pay Adjustment.”
This doc lures victims into downloading a malicious ZIP file hosted on Netlify, a well-liked hosting platform.
Contained in the ZIP, a .lnk (shortcut) file acts because the preliminary dropper, triggering a cascade of PowerShell scripts and executables designed to compromise the goal system.
The assault not solely goals for monetary acquire by ransomware deployment but additionally embeds satirical and political commentary, together with mockery of Elon Musk and his related initiatives.
Phishing Marketing campaign with Satirical Undertones
The an infection course of is orchestrated by a collection of meticulously crafted elements.
Upon execution of the .lnk file, it invokes a PowerShell script named Pay.ps1, which serves because the entry level for additional malicious actions.
This script subsequently calls stage1.ps1, performing as the first loader and orchestrator for deploying further payloads.
Among the many payloads are cwiper.exe, recognized as a variant of the Fog ransomware, and ktool.exe, a device exploiting Intel’s Carry Your Personal Susceptible Driver (BYOVD) approach to realize kernel-level entry on compromised methods.
Moreover, two obfuscated PowerShell scripts, trackerjacker.ps1 (XOR-encrypted) and lootsubmit.ps1, carry out reconnaissance and geolocation duties utilizing the Wigle API to map victims’ places.
Technical Breakdown of the An infection Chain
The ransomware notice, dubbed RANSOMNOTE.txt, impersonates a person named “Edward Coristine” affiliated with DOGE (a reference to Dogecoin, typically related to Musk).

The notice bizarrely lists .gov electronic mail addresses as tech assist contacts and consists of satirical content material mocking Musk’s initiatives.
In a peculiar distraction tactic, the assault launches a YouTube video ridiculing Elon Musk throughout execution, more likely to confuse or delay the sufferer’s response whereas reinforcing the marketing campaign’s parody-driven motive.
Nevertheless, beneath this trolling exterior lies a transparent monetary goal, as evidenced by the inclusion of a Monero pockets handle for ransom funds.
In keeping with the Report, This marketing campaign’s use of Netlify for internet hosting malicious payloads highlights the rising abuse of respectable cloud platforms for malware distribution, making detection and mitigation tougher.
The mix of phishing, PowerShell-based scripting, and kernel-level exploits underscores the technical sophistication of the menace actors.
Whereas the satirical parts and political commentary add a layer of psychological manipulation, the last word aim stays financial extortion by knowledge encryption.
Organizations and people are urged to stay vigilant towards phishing makes an attempt, scrutinize electronic mail attachments, and deploy strong endpoint safety to counteract such multi-vector assaults.
Indicators of Compromise (IOCs)
Indicator Sort | Worth |
---|---|
Area | hilarious-trifle-d9182e[.]netlify[.]app |
PDF Sha256 | 6eb8b5986ea95877146adc1c6ed48ca2c304d23bc8a4a904b6e6d22d55bceec3 |
cwiper.exe Sha256 | ecfed78315f942fe0e6762acd73ef7f30c34620615ef5e71f899e1d069dabd9e |
ktool.exe Sha256 | 335411c83e1419c7a9074c1fe0775244e020ccebad76582d12898a3f8c2778a0 |
trackerjacker.ps1 Sha256 | 82137b80c2d59095e18330b1793c38b4358ae3b9f8ef2ff96656637cd2d0c891 |
lootsubmit.ps1 Sha256 | 0100a169f6b2008f7884b7685f9b71e68fe62de13be045dfabe6dc699a7f1f4d |
Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get On the spot Updates!