PureLocker Ransomware Encrypt Files in Windows, Linux, & macOS ssn fullz, dumps cvv shop

Researchers discovered a new PureLocker Ransomware that capable of encrypting files in Windows, Linux, and macOS. The ransomware used by threat actors to perform a targeted attack against production servers of the enterprise networks.
Code reuse analysis against Purelocker reveals that the ransomware related to the “more_eggs”,  a backdoor malware often used by Cobalt Gang, FIN6 threat actors and is sold in the dark web.
The ransomware is written in the  PureBasic programming language  and it is very difficult for AV vendor to write a signature for PureBasic binaries and is portable between Windows, Linux, and OS-X.
PureLocker Ransomware mainly targeting both Windows and Linux infrastructure and the attackers using a lot more evasion techniques to fly under the radar and undetected the ransomware for several months.
PureLocker distributed as a Ransomware-as-a-Service Being Used in Targeted Attacks Against Enterprise Servers.
A ransomware sample that compatible with Windows that posed as C++ cryptography library called  Crypto++ and the researchers digging deeper and analyzed the sample and find the following keys.
During the infection, the malware code starts checking to ensure that the file executed as expected by malware authors and the malware exit if it fails any one of these checks.
Once the malware executes its payload, then it deletes itself and also using the anti-analysis technique will never let rise suspicion.
After it completes the encryption process, The ransomware adds the “.CR1” extension for each encrypted file and delete the original file to prevent the recovery.
Later the Purelocker drops the ransom note file on the user’s desktop named YOUR_FILES(.)txt.
Ransom note doesn’t contain any payment information, instead, attacker request users to contact via email. for that, they are using anonymous and encrypted Proton email service.
“Since this is a RaaS, we believe this string is most likely the identifier of the group that is operating these specific samples,” Intezer said.
You can also read the complete Ransomware Attack Response and Mitigation  Checklist .
ssn fullz dumps cvv shop