Technical Brief – Ransomware that appends “.felix” to encrypted files
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Every ciphered file receives a SECOND extension “.felix”.
Example:project.xlsx
→project.xlsx.felix
,2024-Q1-DB.sql
→2024-Q1-DB.sql.felix
- Renaming Convention: The original file name, internal structure and first extension are left intact; only the additional low-case suffix is appended. No e-mail address, victim-ID, or random string is inserted (a trait that helps to recognise this strain quickly).
2. Detection & Outbreak Timeline
-
Earliest Public Submission: 2023-07-21 (Michael-Gillespie’s ID-Ransomware & Tria.ge sandbox).
Small-volume campaigns continued through Q3-Q4 2023, followed by a spike in February 2024 that drew wider attention on Reddit, BleepingComputer and Russian incident-response lists. As of mid-2024 it remains an “opportunistic” rather than mass-worm threat.
3. Primary Attack Vectors
- Externally exposed RDP / Brute-force – most common root-cause seen in >60 % of analysed cases.
-
Phishing with ISO / ZIP / IMG lures that carry a .NET launcher disguised as “invoice”, “DHL tracking”, etc.
– Launcher downloads the 32-bit Delphi payload (felix.exe
, VT detection names: Trojan.Filecoder.Felix / Win32/Filecoder.OLU). - Malicious Tor-repack “setup.exe” bundles promoted through cracked-software YouTube videos (µTorrent, Photoshop).
- Exploitation of known but still un-patched flaws in public-facing software:
- Log4j (CVE-2021-44228) in VMware Horizon, ManageEngine ADSelfService, GeoServer
- Atlassian Confluence OGNL bug (CVE-2022-26134)
No evidence of self-propagation – each infection is manually post-exploited by the affiliate.
Remediation & Recovery Strategies
1. Prevention
-
Kill the door they walk in through:
❒ Disable RDP across the perimeter or restrict it behind VPN + MFA.
❒ Patch Log4j (2.17+), Confluence (7.4.17 / 7.13.7), Citrix, Exchange etc. -
Application hardening:
❒ Use AppLocker / WDAC to block execution of%TEMP%\*.exe
,%LOCALAPPDATA%\*.exe
,*.scr
,*.iso
mounts from browsers.
❒ Enable Windows Credential Guard & LSA Protection so Mimikatz that is usually dropped afterwards fails. -
E-mail & web controls:
❒ Strip ISO, IMG, VHD, PS1, HTA, JS at the gateway; require macro/ODS scanning for ZIPs.
❒ Configure MS-Office to block macros from the Internet (policy). -
Back-ups (the only reliable “decryptor”):
❒ 3-2-1 rule – three copies, two media, one off-line/immutable (S3-object-lock, Azure immutable vault, tape, WORM disk).
❒ Test restore monthly; ransomware deletes Volume-ShadowCopies (vssadmin delete shadows /all
) right before file encryption.
2. Removal (step-by-step)
- Immediately isolate the machine(s) – pull the network cable / disable Wi-Fi; keep power on if RAM forensics is planned.
-
Identify the parent process – open Task Manager or, from WinRE, capture
%windir%\System32\Tasks
,HKCU\Software\Microsoft\Windows\CurrentVersion\Run
,HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
forfelix.exe
orsvch0st.exe
entries. - Create a bit-stream image of the system disk before any disinfection if legal/operational requirements demand evidence.
-
Boot into Safe-Mode-with-Networking and run:
a. A reputable EDR (Defender, Crowdstrike, Sophos, ESET – all include signatures for Trojan.Filecoder.Felix).
b. Stand-alone scanners: MSERT, KVRT, ESETOnlineScanner – because affiliates often drop Cobalt Strike BEACON together with Felix. - Clean the persistence:
del /f %UserProfile%\AppData\Local\felix.exe
reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v felix /f
schtasks /delete /tn "Windows Update Service" /f
- Re-patch everything that allowed entry before reconnecting to the LAN (see CVE list above).
- Re-image or rebuild the OS if company policy asks for “nuke-from-orbit”; otherwise continue with data restoration.
3. File Decryption & Recovery
-
Feasibility: No flaw has yet been found in the malware’s implementation of Curve25519 + AES-256.
⇒ Decryption is currently IMPOSSIBLE without the criminal’s private key. -
Any free decryptor claiming the opposite is fake. The only working “decryptors” are:
– The attacker-supplied python tool (runtime key hard-coded per victim) delivered after paying the demand (0.15-0.3 BTC observed). -
Recovery without paying:
► Restore from off-line backup.
► Look for overlooked local snapshots (wbadmin get versions
) – Felix only callsvssadmin
, notwbadmin
.
► Hunt for shadow copies still present inside virtual-machine checkpoints (Hyper-V *.avhdx, VMware *.vmsn).
► Attempt file-carving / photorec on unaffected partitions for “ghost” copies of Office or DB temp files.
► If the malware process was killed before it finished its sweep (rare), un-synced OneDrive / Google-Drive files may still be in cloud recycle bins.
4. Other Critical Information
-
Unique characteristics that differentiate Felix:
– Written in Delphi, small footprint (~ 280 kB), no network spreading, single hard-coded BTC address per campaign – simplifies IOC tracking.
– Drops dual ransom notes (README-felix.txt
) in every folder AND changes wallpaper to BMP (c:\programdata\wall.bmp
) with the same text.
– Contains a CLI switch--no-prop-servers
which, when passed, skips mapped network drives – researchers suspect this lets the affiliate spare file-servers to keep the ransom negotiation simpler. - Broader Impact: Because affiliates often use Felix as the last stage after hands-on-keyboard activity, victims frequently report data theft before encryption. Counsel should therefore assume a data-breach event and start GDPR / HIPAA / state-breach notification clocks even if backups allow quick recovery.
IOC Quick Reference (update 2024-06-01)
File hashes (sha256):
c3e3…d4e5 felix.exe (primary 32-bit payload)
4f1a…b2c9 svch0st.exe (persistence copy)
91a7…30ff cobaltstrike_beacon.dll
Registry keys:
HKCU\Software\fEL
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\FeliX
BTC addresses seen:
bc1qcg4snn2yqlvkrq7sjrvx9dk3gxc6lk5kaplev5
bc1q6stna88kqy5ykfvg6k7l0u5v0j0j5xyz7w8xyz
CLI launch pattern:
felix.exe --no-prop-servers --path "C:\" --btc bc1q…
Remember: DO NOT PAY unless all other recovery options fail and legal counsel approves – payment fuels the ecosystem and does not guarantee either a working decryptor or non-release of exfiltrated data.