
Lynx Ransomware
Lynx Ransomware is rapidly expanding, targeting organizations across North America and Europe with data theft and double extortion, backed by a growing network of skilled affiliates.

BoomBox is a malicious downloader used by the actor known as Dark Halo (aka NOBELLIUM, UNC2452).
The malware (named after the original file BOOM.exe) is dropped as a part of a malicious ISO using the so-called EnvyScout dropper.
Initial execution of the main executable causes the program to validate that a directory called "NV" is located in the working directory. If no directory is present the process terminates. If the folder is identified, then BoomBox displays the NV directory in a new window which, as of writing, contains a PDF that the user must then execute.
Additionally, the malware looks for the presence of the file %AppData%\Microsoft\NativeCache\NativeCacheSvc.dll. If the file is present, it will again terminate.
If all checks are successful, it then begins system enumeration and collects hostname, domain, IP, and username.
If the system which BoomBox is executed on is joined to a domain, it also gathers additional details through LDAP including distinguished name, SAM account name, email and display names of all domain users by using the filter (&(objectClass=user)(objectCategory=person)).
This information is then encrypted using AES with a hardcoded encryption key "123do3y4r378o5t34onf7t3o573tfo73" and Initialization Vector (IV) value of "1233t04p7jn3n4rg". BoomBox then prepends the so-called magic number "%PDF-1.3 %" to the beginning of the file to allow it to masquerade as a PDF.
BoomBox then uploads the PDF to a target-specific directory on DropBox with the folder name being the MD5 value of the victim's system name. Once uploaded, BoomBox also downloads an encrypted payload from Dropbox. To decode the file, BoomBox first strips the first 10 bytes of the header and 7 bytes of the footer and then uses the hardcoded key and IV used to encrypt the file containing host enumeration results. The decrypted file is saved to %AppData%\Microsoft\NativeCache\ with a name of NativeCacheSvc.dll.
BoomBox then downloads a second file from /tmp/readme.pdf, again discarding the first 10 bytes of the header, and 7 bytes from the footer. This file is also encrypted, and it decrypts it using the same key and IV as before. This file is written to %AppData%\SystemCertificates\ with a filename of CertPKIProvider.dll and is used to execute NativeCacheSvc.dll using rundll32.exe.
The malware establishes persistence for the NativeCacheSvc.dll file by creating a Registry Run value MicroNativeCacheSvc in:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\MicroNativeCacheSvc
With the value:
rundll32.exe %AppData%\Microsoft\NativeCache\NativeCacheSvc.dll _configNativeCache
The malware uploads data to dropbox using a hardcoded Dropbox Bearer Token, through standard HTTPS POST requests.
Get the Free Hunt Packages!
Check Out Other Emerging Threats >

Lynx Ransomware is rapidly expanding, targeting organizations across North America and Europe with data theft and double extortion, backed by a growing network of skilled affiliates.

Threat actors are increasingly using methods to circumvent multifactor authentication, which poses a risk of account takeover. Here’s a briefing on some types of attacks and defenses to put in place.

mommy Access Broker is enabling access-as-a-service operations through detailed intrusion guides and compromised credentials, and Intel 471 has released reporting and Hunt Packages to support threat hunting and detection.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.