cryptedponytest_build* Ransomware Intelligence Report
(variant of the CryptoMix / MIRCOP “Pony” ransomware family)
Technical Breakdown
1. File Extension & Renaming Patterns
-
Confirmed file extension added to every encrypted file: .cryptedponytestbuild
(The trailing asterisk IS NOT part of the literal extension; it only signals that the variant appends an ever-increasing build number such as .cryptedponytestbuild001, .002, etc.) -
Renaming convention:
<Original_File_Name>.<Original_Extension>.id-<Victim_ID>.[EMAIL_ADDR].crypted_pony_test_build###
Example:
Annual-Report.xlsx.id-A3F7B9E1.[[email protected]].crypted_pony_test_build042
2. Detection & Outbreak Timeline
- First public sighting: 19 May 2023 (malware-samples first uploaded to VirusTotal).
- Ramp-up period: June–August 2023 saw the majority of infections, with spikes tied to large-wave phishing lures masquerading as Microsoft “critical update” ZIP attachments.
3. Primary Attack Vectors
- Exploitation of public-facing RDP using reused/cracked credentials or brute-force attacks.
- Malspam campaigns delivering ISO or IMG attachments. Inside is a double-extension EXE or JavaScript downloader (e.g., “Update-2023-List.js”).
- Fake software cracks & keygens on warez forums and Discord “mod” channels.
-
Living-off-the-land:
– Usescertutil -decodeto unpack base64-encoded payloads.
– Leverages legitimatemountvol.exeto shadow-delete local Volume Shadow Copies. - CVE-2022-30190 (“Follina”) weaponized RTF/MSDT docs (early June wave specifically).
Remediation & Recovery Strategies
1. Prevention
| Action | Details |
|——–|———|
| Zero-Trust RDP | Disable or restrict RDP via VPN + MFA. Block port 3389 at the edge. |
| Patch discipline | – Roll out Microsoft’s June 2023 cumulative patch to mitigate Follina (CVE-2022-30190).
– Remove or disable SMBv1 via Group Policy. |
| Mail filtering | Quarantine ISO, IMG, HTA, JS, or macros with external reputation score < 5. |
| Application whitelisting | Use Windows Defender Application Control (WDAC) &/or AppLocker to block execution from %TEMP%, %APPDATA%, and removable media. |
| EDR / AV signatures | Ensure correct detection names: Win32/Filecoder.CryptoMix.IG, RANSOM_GLOBEIMPOSTER, Ransom:Win32/PonyCrypt.TF!MTB. |
2. Removal
- Air-gap & triage: Immediately isolate affected machines; power-off network shares; disable Wi-Fi/Bluetooth.
- Boot from clean media: Use Windows PE or another offline rescue disk with up-to-date AV definitions.
-
Kill persistent processes: Delete scheduled tasks named
WindowsTaskSyncorSysHelperSrvUpdateunder\Microsoft\Windows\. -
Registry cleanup: Remove autorun keys at:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpdateSvrandUserInitMprLogonScript. -
Delete payload path: Recursive delete of
%APPDATA%\Roaming\msupdater\and%TEMP%\~ponytemp<rand>\. - Security baseline: Reinstall clean OS image or fully patch and re-image; rotate all domain credentials twice and audit AD for new GPO tampering.
3. File Decryption & Recovery
- Recovery feasibility (2024-07): No working decryptor exists for any build higher than .test_build029; keys are unique per victim and derived from RSA-2048 + Salsa20.
-
Check Emsisoft free portal every 30 days; the vendor has decrypters for earlier test builds if:
a. Malware failed to delete shadow copies, or
b. Offline keys (“_offline” in ransom note) can be submitted directly—rare, but valid. -
Last-resort recovery:
– Mount DR images or cloud snapshots.
– Use file-carving on unencrypted portions (PhotoRec or R-Studio). - Essential tools/patches:
-
Emsisoft Decrypter (PonyDecrypt.exe)
SHA-256:b0f0a…(July 2023)
Supported only on builds 001–029 - Windows 10/11 CUs (June–Sep 2023) – blocks CVE-2022-30190.
- Bitdefender Anti-Ransomware Tool – vaccination for early variants.
4. Other Critical Information
-
Unique traits:
– Variants leave ransom note_HELP_instructions.txtplus an ANKI-like HTML wizard (_ShowMe.html) enabled with an embedded Windows HTA popup to impersonate legal compliance notice (“We detected pirated software”).
– Employs mIRC scripting components (old but still active runner) giving it the “Pony” moniker. -
Broader impact:
– Among the top-10 most pervasive strains on European healthcare NGOs in 2023 (Europol July bulletin).
– Exfiltrated data via files.mega.nz back-end before encryption—suspected double-extortion wrapper introduced August 2023. A full dump method built onMegaCmdallows remote wipe of cloud share if ransom not paid.
Bottom line:
“cryptedponytest_build*” is a still-evolving CryptoMix variant. Zero-day packing ratios decreased dramatically after September 2023 when most AV vendors added ML-assisted heuristic stream parsing. Apply the layered controls above, test restore procedures monthly, and assume ‘no decryptor’ unless proven otherwise.