New AXLocker Ransomware Steals Victims’ Discord Tokens

New AXLocker Ransomware Steals Victims’ Discord Tokens

Security researchers have warned of a new ransomware variant that not only encrypts the victim’s files but also attempts to steal data by enabling a Discord account takeover (ATO).

AXlocker

The new ‘AXLocker’ ransomware family is not only encrypting victims’ files and demanding a ransom payment but also stealing the Discord accounts of infected users.

Once triggered, the malware(opens in new tab) targets specific file extensions and avoids some folders. It encrypts the files using the AES algorithm, but it doesn’t change their extensions – they remain with their normal filenames. It demands payment in cryptocurrency and gives users 48 hours to comply. 

When a user logs into Discord with their credentials, the platform sends back a user authentication token saved on the computer. This token can then be used to log in as the user or to issue API requests that retrieve information about the associated account.

While the NFT and crypto community is used to cyberattacks and various criminals going after their digital belongings, stealing Discord tokens in the process makes this ransomware attack a lot more potent. 

Unfortunately, there isn’t an easy solution for files that have been encrypted. Documents, images, videos, and even zip files are targeted, and the ransom note indicates that you only have 48 hours to respond and instructs you to leave the computer on. There are no further details given about what might happen if you do not comply.

“Threat actors are increasingly attempting to maintain a low profile to avoid drawing the attention of law enforcement agencies,” it concluded.

AXLocker Indicators Of Compromise

We have few IOCS from cyble

IndicatorsIndicator typeDescription
ab2c19f4c79bc7a2527ab4df85c69559
60a692c6eaf34a042717f54dbec4372848d7a3e3
d51297c4525a9ce3127500059de3596417d031916eb9a52b737a62fb159f61e0
MD5
SHA-1
SHA256
AXLocker
Ransomware
executable
07563c3b4988c221314fdab4b0500d2f
a5f53c9b0f7956790248607e4122db18ba2b8bd9
0225a30270e5361e410453d4fb0501eb759612f6048ad43591b559d835720224
MD5
SHA-1
SHA256
AXLocker
Ransomware
executable
a18ac3bfb1be7773182e1367c53ec854
c3d5c1f5ece8f0cf498d4812f981116ad7667286
c8e3c547e22ae37f9eeb37a1efd28de2bae0bfae67ce3798da9592f8579d433c
MD5
SHA-1
SHA256
AXLocker
Ransomware
executable
9be47a6394a32e371869298cdf4bdd56
ca349c0ddd6cda3a53ada634c3c1e1d6f494da8a
9e95fcf79fac246ebb5ded254449126b7dd9ab7c26bc3238814eafb1b61ffd7a
MD5
SHA-1
SHA256
AXLocker
Ransomware
executable
ad1c2d9a87ebc01fa187f2f44d9a977c
03d871509a7369f5622e9ba0e21a14a7e813536d
d9793c24290599662adc4c9cba98a192207d9c5a18360f3a642bd9c07ef70d57
MD5
SHA-1
SHA256
AXLocker
Ransomware
executable
346e7a626d27f9119b795c889881ed3d
ce25203215f689451a2abb52d24216aec153925a
9a557b61005dded36d92a2f4dafdfe9da66506ed8e2af1c851db57d8914c4344
MD5
SHA-1
SHA256
Octocrypt
Ransomware
executable
5a39a2c4f00c44e727c3a66e3d5948c2
07e7341b86ace9935c4f1062d41a94f3b31f9bf6
65ad38f05ec60cabdbac516d8b0e6447951a65ca698ca2046c50758c3fd0608b
MD5
SHA-1
SHA256
Octocrypt
Ransomware
executable
2afdbca6a8627803b377adc19ef1467d
13a0ce1c3ac688c55ba3f7b57fb6c09ad0e70565
e65e3dd30f250fb1d67edaa36bde0fda7ba3f2d36f4628f77dc9c4e766ee8b32
MD5
SHA-1
SHA256
Octocrypt
Ransomware
UPX packed
executable

Follow Us on: Twitter, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!