Threat Database Ransomware CryptMix Ransomware

CryptMix Ransomware

By GoldSparrow in Ransomware
Translate To:

Threat Scorecard

Popularity Rank: 3,670
Threat Level: 80 % (High)
Infected Computers: 2,935
First Seen: May 5, 2016
Last Seen: October 13, 2025
OS(es) Affected: Windows

The CryptMix Ransomware is a ransomware Trojan. However, the CryptMix Ransomware has a twist that's quite unexpected, particularly if compared to other encryption ransomware Trojans. Apparently, the CryptMix Ransomware claims that it will donate part of the money gathered from its attacks to a children's charity. The CryptMix Ransomware is being distributed by a group of con artists that is calling themselves the 'Charity Team.' The CryptMix Ransomware ransom note claims that part of the money will go to a charity that benefits children. The CryptMix Ransomware was first observed in the Spring of 2016. PC security researchers strongly advise computer users to avoid paying the CryptMix Ransomware ransom. Apart from these supposed claims, the CryptMix Ransomware is no different from other ransomware Trojans, designed to take your money by making your files hostage.

What are the CryptMix Ransomware Actions After Infecting a Computer

The CryptMix Ransomware has elements of various encryption ransomware families. The CryptMix Ransomware seems to be a combination of versions 3.0 and 4.0 of CryptoWall and the ransomware Trojan CryptXXX. These combined elements, the CryptMix Ransomware got its name. The CryptMix Ransomware is currently being spread through drive-by-downloads. Essentially, the CryptMix Ransomware is hosted on corrupted websites that may include an exploit kit. These exploit kits use vulnerabilities on the victim's computer to deliver the CryptMix Ransomware automatically. Computer users may be directed to the websites associated with the CryptMix Ransomware through redirect scripts on compromised websites or links embedded in spam email messages. When the victims open a link in a spam email message, their Web browser is sent to the attack website immediately, where vulnerabilities in the victim's computer are used to download and install the CryptMix Ransomware.

The CryptMix Ransomware Attack

When the CryptMix Ransomware enters the victim's computer, it starts encrypting the victim's computer automatically. The CryptMix Ransomware can encrypt 862 different types of files. The CryptMix Ransomware adds the extension '.CODE' to files that it has encrypted. After encrypting the victim's files, the CryptMix Ransomware delivers ransom notes to the victim's desktop. The CryptMix Ransomware uses both a HTML ransom note associated with CryptXXX or a text file note that is may be associated with CryptoWall variants. The ransom note is straightforward: it claims that the victim's files were encrypted using the RSA-2048 encryption. It contains an identifier, and the victim is asked to email one or two different email addresses to receive instructions on payment and how to decrypt the files.

When computer users send an email to one of these email addresses, they are provided with a link and password to the One Time Secret, a service that allows computer users to send each other anonymous messages. The ransom demanded by the CryptMix Ransomware is very costly. The CryptMix Ransomware demands a payment of five BitCoin, which is approximately $2,200 USD at the current exchange rate. This is especially high when one considers that most ransomware Trojans demand a ransom of somewhere between 0.5 and 1.5 BitCoin. The CryptMix Ransomware claims that part of the ransom amount will be used to contribute to a charity that benefits children. However, the people responsible for the CryptMix Ransomware also use threats, claiming that if the payment isn't carried out right away, the infected users will have to pay twice the amount after 24 hours. One ironic aspect of the CryptMix Ransomware is that the con artists responsible for this attack offer to 'sweeten the deal' by offering three years of technical support, which is completely ridiculous considering who is offering it.

The decryption of the files encrypted by the CryptMix Ransomware is not possible without access to the decryption key currently. On that account, the best solution when handling the CryptMix Ransomware is to restore the encrypted files from a backup after removing the CryptMix Ransomware. Backup all files on an external device or the cloud to avoid these problems in the future.

Analysis Report

General information

Family Name: Trojan.Phorpiex.EA
Signature status: No Signature

Known Samples

MD5: 141b85ef177c295990d7f7f0a725dafb
SHA1: ba3cfa400efdadbeac16407b73dec1d939bddf53
File Size: 80.38 KB, 80384 bytes
MD5: d1bbdee61dabe43d189b1618bd6d9d9e
SHA1: 0d5da94068a47689e693246ed954bda1a1d7f035
SHA256: 4F1DDA9749E38A76FCF0C5A80BAF2F7166C0787C0EB9D86F50C689B1263E94D2
File Size: 85.50 KB, 85504 bytes
MD5: 4c6b4d2db02f81616dc512392eefc927
SHA1: 663788b339fe6bd25d500080b1a174303042969f
SHA256: A336B6622760CC6114C4E36B7B4BC645B573278FD6D570EF1D701F4351A5AC10
File Size: 10.24 KB, 10240 bytes
MD5: 19e4ff6c2903ba92d901fb338636c2a3
SHA1: d11a3a944c551d1d148d02ec2e9f56c0af258de3
SHA256: 0D5170295798107B652D3A3218FFF759F47A51C35584119DE8CBBDCB0CE10E49
File Size: 10.24 KB, 10240 bytes
MD5: 19a4a8b772bf80094a8910c956902756
SHA1: 54612fbf19b5afe1bbd8f2ebe334362b05fef094
SHA256: C5570FFEF7159920C30D9B255C5E9288C5EC1820261BE3E5F5222F38B91DF4F1
File Size: 10.24 KB, 10240 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have resources
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • No Version Info
  • ntdll
  • x86

Block Information

Total Blocks: 22
Potentially Malicious Blocks: 3
Whitelisted Blocks: 16
Unknown Blocks: 3

Visual Map

x ? x x ? ? 0 0 1 0 0 1 1 0 0 2 2 2 3 1 0 1
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Phorpiex.EAA
  • Phorpiex.L

Files Modified

File Attributes
Generic Read,Write Data,Write Attributes,Write extended,Append data
Synchronize,Write Attributes
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.0.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.1.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\microsoft\windows\usrclass.dat{dba6b5ef-640a-11ed-9bcb-f677369d361c}.txr.2.regtrans-ms Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\104277189.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\1244511931.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\144819867.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\221917830.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\2512714294.exe Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\254904938.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\3121710357.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\323215511.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\429711102.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\97954775.exe Generic Write,Read Attributes
c:\windows\sysgredlvrs.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\sysgredlvrs.exe Synchronize,Write Attributes
c:\windows\sysparvadl.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\sysparvadl.exe Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\sysparvadl.exe RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix Cookie: RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix Visited: RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\sysgredlvrs.exe RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Network Winsock2
  • WSAStartup
Network Winsock
  • bind
  • closesocket
  • connect
  • gethostbyname
  • getsockname
  • inet_addr
  • recvfrom
  • sendto
  • setsockopt
  • socket
Anti Debug
  • NtQuerySystemInformation
Network Wininet
  • HttpQueryInfo
  • InternetOpen
  • InternetOpenUrl
  • InternetReadFile
Network Urlomon
  • URLDownloadToFile

Shell Command Execution

C:\WINDOWS\sysparvadl.exe
C:\WINDOWS\sysgredlvrs.exe

Trending

Most Viewed

Loading...