New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a highly sophisticated phishing-based attack.

Cybersecurity researchers have uncovered a multi-stage infection chain that begins with a deceptive PDF document titled “Pay Adjustment.”

This document lures victims into downloading a malicious ZIP file hosted on Netlify, a popular web hosting platform.

Inside the ZIP, a .lnk (shortcut) file acts as the initial dropper, triggering a cascade of PowerShell scripts and executables designed to compromise the target system.

The attack not only aims for financial gain through ransomware deployment but also embeds satirical and political commentary, including mockery of Elon Musk and his associated projects.

Phishing Campaign with Satirical Undertones

The infection process is orchestrated through a series of meticulously crafted components.

Upon execution of the .lnk file, it invokes a PowerShell script named Pay.ps1, which serves as the entry point for further malicious activities.

This script subsequently calls stage1.ps1, acting as the primary loader and orchestrator for deploying additional payloads.

Among the payloads are cwiper.exe, identified as a variant of the Fog ransomware, and ktool.exe, a tool exploiting Intel’s Bring Your Own Vulnerable Driver (BYOVD) technique to gain kernel-level access on compromised systems.

Additionally, two obfuscated PowerShell scripts, trackerjacker.ps1 (XOR-encrypted) and lootsubmit.ps1, perform reconnaissance and geolocation tasks using the Wigle API to map victims’ locations.

Technical Breakdown of the Infection Chain

The ransomware note, dubbed RANSOMNOTE.txt, impersonates an individual named “Edward Coristine” affiliated with DOGE (a reference to Dogecoin, often associated with Musk).

Elon Musk Supporters
Notepad

The note bizarrely lists .gov email addresses as tech support contacts and includes satirical content mocking Musk’s initiatives.

In a peculiar distraction tactic, the attack launches a YouTube video ridiculing Elon Musk during execution, likely to confuse or delay the victim’s response while reinforcing the campaign’s parody-driven motive.

However, beneath this trolling exterior lies a clear financial objective, as evidenced by the inclusion of a Monero wallet address for ransom payments.

According to the Report, This campaign’s use of Netlify for hosting malicious payloads highlights the growing abuse of legitimate cloud platforms for malware distribution, making detection and mitigation more challenging.

The combination of phishing, PowerShell-based scripting, and kernel-level exploits underscores the technical sophistication of the threat actors.

While the satirical elements and political commentary add a layer of psychological manipulation, the ultimate goal remains monetary extortion through data encryption.

Organizations and individuals are urged to remain vigilant against phishing attempts, scrutinize email attachments, and deploy robust endpoint protection to counteract such multi-vector attacks.

Indicators of Compromise (IOCs)

Indicator Type Value
Domain hilarious-trifle-d9182e[.]netlify[.]app
PDF Sha256 6eb8b5986ea95877146adc1c6ed48ca2c304d23bc8a4a904b6e6d22d55bceec3
cwiper.exe Sha256 ecfed78315f942fe0e6762acd73ef7f30c34620615ef5e71f899e1d069dabd9e
ktool.exe Sha256 335411c83e1419c7a9074c1fe0775244e020ccebad76582d12898a3f8c2778a0
trackerjacker.ps1 Sha256 82137b80c2d59095e18330b1793c38b4358ae3b9f8ef2ff96656637cd2d0c891
lootsubmit.ps1 Sha256 0100a169f6b2008f7884b7685f9b71e68fe62de13be045dfabe6dc699a7f1f4d

Related Articles

Back to top button