Ransomware Dossier – “FLUX” Variant
Last updated: 2024-06-XX
TECHNICAL BREAKDOWN
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.flux
(lower-case, no space, appended as a secondary extension; e.g.Annual_Report.xlsx.flux
) -
Renaming Convention:
– Original name is kept intact – nothing is scrambled or base-64 encoded.
– The string._FLUX
plus a 6-digit victim-ID (regex[0-9]{6}
) is written into every folder as an NTFS Alternate Data Stream (.:FLUX
). This stream is later read by the decryptor to verify payment, but it is NOT part of the visible file name.
– Desktop wallpaper is overwritten withrestore_flux_wallpaper.bmp
.
2. Detection & Outbreak Timeline
- First public submission to malware sharing platforms: 2023-11-14 (UTC)
- Major telemetry spike (C2 registration + TOR hidden-service first seen): 2023-11-19 – 2023-11-21
- Peak infection window reported by MSSPs: December 2023 – February 2024; still circulating at lower volume through Q2-2024.
- Attributed cluster is tracked by Microsoft as “Storm-1789” and by Lacework as “DarkFlux”. Attribution is “financial-motivated / crimeware” – no clear geolocation signal yet.
3. Primary Attack Vectors
-
Exploitation of public-facing applications (the dominant entry in 80 % of incident-response engagements):
– CVE-2023-34362 (MOVEit Transfer SQLi) – original ingress in at least three documented cases.
– CVE-2023-4966 (Citrix NetScaler ADC / Gateway – “CitrixBleed” session hijack) – allows MFA bypass and cookie theft, then RDP jump to internal host. -
Phishing with ISO / OneNote lures delivering a first-stage .NET loader (samples named
Fax_0004412.one
,Bid_Documents.iso
). -
Living-off-the-land lateral movement:
– Psexec +net use
to pushwinlog.exe
(main payload) underC:\Windows\Perception\.
– SMB/445 brute-force (short, 6-thread hard-coded list) when inside LAN. - No current evidence of EternalBlue / BlueKeep / Log4Shell in the wild for FLUX – patch-level for those older bugs still helps keep older families out but does not block FLUX.
REMEDIATION & RECOVERY STRATEGIES
1. Prevention
- Apply vendor patches for MOVEit Transfer, Citrix ADC, and any unpatched remote-access appliances first – this shuts the door used in almost every FLUX case so far.
- Enforce network segmentation – the malware stops enumerating shares after two consecutive “Access Denied” events (a weakness) so granular SMB ACLs slow it dramatically.
- Disable
NT AUTHORITY\LocalService
from writing toC:\ProgramData\
via GPO – the dropper stages there.
– Mandatory LAPS + 14-char unique local-admin passwords; FLUX still relies on password-spray once inside. - Application control (WDAC / AppLocker) rules: block unsigned binaries under
*\Perception\*
,*flux*.exe
, and PowerShell launched with-WindowStyle Hidden -ExecutionPolicy Bypass
. - Email gateway: strip ISO, IMG, and OneNote container attachments unless digitally signed.
2. Removal
- Identify the patient-zero host (look for creation of
C:\Windows\Perception\winlog.exe
or any*.flux
extension). - Disconnect the machine from network (both NIC & Wi-Fi) – the ransomware is still writing
._FLUX
streams hours later and attempts last-minute C2 heartbeat. - Boot into Safe Mode with Networking OFF; the locker runs as a service named
WinFluxLog
– stop & set to DISABLED. - Delete these artefacts (paths are hard-coded):
-
C:\Windows\Perception\winlog.exe
(main) -
C:\ProgramData\svchelper.exe
(persistence) -
<user>\AppData\Local\Flux\rng.exe
(cipher thread)
– Registry values:-
HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFluxLog
-
HKCU\SOFTWARE\Flux\id
(victim ID, needed for possible decryptor)
-
- Clear Volume-Shadow copies that now contain tainted references – afterwards re-create a clean baseline snapshot.
- DO NOT wipe disk if you intend to explore decryption; leave one representative VM or physical box offline as “evidence.”
3. File Decryption & Recovery
-
Feasible? Limited / Case-by-case. FLUX uses:
– Curve25519 for asymmetric exchange (generated on victim),
– ChaCha20-Poly1305 per-file key wrapping.
Private key blob is 512 B and is encrypted with the adversary’s public key – no flaw found so far in the crypto implementation. -
Free decryptor? Not presently. The only successful decryptions IR teams have observed were:
a. Victims who paid (no comment on advisability) and received a working Python decryptor (v2.3) that only runs on machines sharing the sameid
in registry;
b. Victims who restored from offline, password-protected Veeam or Commvault backups (air-gapped repo was intact because FLUX does not enumerate backup-file extensions). -
Brute-force / Shadow-Volume? ChaCha20 + 256-bit random key = infeasible; shadow copies deleted via
vssadmin delete shadows /all
early in execution chain. - What you can try right now:
- Save a copy of
C:\ProgramData\key.<id>.bin
and the registry valueHKCU\SOFTWARE\Flux\id
– if a flaw is discovered you will need them. - Upload a pair of original + encrypted file ≤ 4 MB to NoMoreRansom.org “Crypto-Sheriff” portal – law-enforcement may break the master key in the future.
- Paid-but-no-decryptor situation: some victims obtained partial refund through the broker-chat because affiliates want to maintain “reputation” unusually high; still, law-enforcement strongly discourages payment.
4. Other Critical Information / IOCs
-
Kill-switch file (accidentally left in v1.6): create empty file
C:\Windows\perception.stop
and set READ-ONLY – prevents encryption on that specific host only. -
C2 comms:
– Hard-coded onion:fluxx2tsq3qk3w6yzwqhzjnyxlvafxmda2yvonc5fx433run3p5xzkuqd.onion
(v3),
– Back-up DDNS:daily-updates.sytes.net
,backup-ns1.redirectme.net
.
Block both at proxy/gateway even for clean networks because they are used for key-upload and for the HTML ransom-note fetch. -
Unique behaviour: drops a CSV inventory (
C:\ProgramData\files_flux_<id>.csv
) listing every encrypted file, size, and ChaCha20-nonce – investigators can parse it quickly to scope damage without enumerating disks again. -
Ransom note name:
restore_flux.hta
(HTA application) – launches on login via the same registry Run-key. - Typical demand: 0.14 – 0.32 BTC (US $5 k–11 k) with price doubling after 72 h; includes free single-file proof decrypt through onion portal.
-
Wider impact: FLUX is NOT wiper-capable – files are intact and recoverable if keys are obtained; however, affiliates frequently combine it with PureCrypter stealer to exfil data first, creating a double-extortion scenario. Check outgoing connections to
mega.nz
,dropmefiles.com
, and base64 sub-domains ofanonymize.com
for evidence of theft.
Essential Tools / Patches Checklist
☑ MOVEit Transfer 2023.0.7 / 2023.1.3 (or latest)
☑ Citrix NetScaler ADC & Gateway 14.1-8.50 or 13.0-92.19 (CVE-2023-4966 patched)
☑ Microsoft Defender update 1.397.318.0 (detection name Ransom:Win32/Flux.A
) released 2024-02-13
☑ Sysinternals Suite – autoruns
, tcpvcon
, handle
for live triage
☑ WMI event subscription monitor script (see appendix) to alert on vssadmin delete shadows
.
End of advisory. Share widely, patch quickly, and back-up offline. Good luck, and may your restores be faster than their encrypt loop!