5
min read

Threat updates: AidLocker/Frag - new variants of HellCat/Morpheus ransomware

Published on
February 7, 2025
Copy link
Share on LinkedIn
Share on X/Twitter
Share on Facebook

Sentinel One has recently reported (https://www.sentinelone.com/blog/hellcat-and-morpheus-two-brands-one-payload-as-ransomware-affiliates-drop-identical-code/) about HellCat and Morpheus ransomware samples, which are code-wise identical but identify themselves as distinct variants in their ransomware notes.

At Threatray, we continuously track new malware samples using our code search engine to identify relationships based on code reuse between new and existing malware. Through this process, we discovered two ransomware samples that identify themselves as AidLocker and Frag in their ransomware messages. Our key findings are:

  1. Like the HellCat/Morpheus pair, the AidLocker/Frag pair is code-wise identical but features different branding in their ransom messages.
  2. AidLocker/Frag share substantial code with HellCat/Morpheus, confirming they are variants of the same family.

The following sections detail the similarities and differences between AidLocker/Frag and HellCat/Morpheus. Our analysis compares the AidLocker and HellCat samples specifically, since Frag is identical to AidLocker and Morpheus is identical to HellCat.

Shared capabilities

The samples are relatively small, with HellCat containing 10 functions and AidLocker containing 16 functions.

The samples share 5 core functions that handle file enumeration and encryption. Below, we examine these functions, with AidLocker shown on the left and HellCat on the right in the screenshots.

Encryption Setup Function

This function handles the import of an RSA public key and configures both AES and RSA cryptographic providers.

AidLocker 0x1400042a0 - HellCat 0x140001020

File Encryption

Both samples use BCrypt for encryption.

AidLocker 0x140001000 - HellCat 0x1400012c0

Thread management

This function is designed to execute within a thread and manage the file encryption process, it is identical in both cases.

AidLocker 0x140004090 - HellCat 0x140002ce0

File iteration

This function iterates through directories, skipping those listed in the exclusion list. The logic is identical for AidLocker and HellCat, though they use different exclusion lists.

AidLocker 0x140002390 - HellCat 0x140002060

HellCat excludes only "\Windows\System32" while AidLocker implements a more comprehensive exclusion list shown below.

Type image caption here (optional)AidLocker exclusion list.

Ransomware note creation

The ransom note generation method is identical between the variants, with the only difference being the filename: AidLocker creates "README.txt" while HellCat creates "_README_.txt".

AidLocker 0x140001320 - HellCat 0x140001b90

Distinct capabilities

Let’s have a look at some implementation differences between AidLocker and HellCat.

AidLocker adds the .aid666 extension to encrypted files, while HellCat does not modify file extensions during encryption.

AidLocker 0x140003D70

Additionally, AidLocker has a much larger list of file extensions it won't encrypt compared to HellCat.

AidLocker 0x1400046B0 - HellCat 0x140002EF0

Unlike HellCat, if AidLocker attempts to access the file with both read and write permissions (0xC0000000) and encounters a failure, it will retry with read-only permission (0x80000000). Subsequently, it will terminate any processes that currently hold the file open. This action is taken to eliminate any potential file locks that might hinder modification during the encryption procedure.

AidLocker 0x140001130 - HellCat 0x1400013F0

AidLocker uses ‘wmic shadowcopy delete’ to destroy shadow copies, while HellCat is lacking this functionality.

AidLocker 0x140001300

Finally, there is a difference in command-line argument handling. AidLocker enforces strict argument checking, requiring at least two specific parameters (-p, -d, -f, -del, or -h). HellCat, on the other hand, is more permissive and will execute with any two arguments.

AidLocker 0x1400046B0 - HellCat 0x140002EF0

Conclusions

A key question remains about the relationship between the HellCat/Morpheus and AidLocker/Frag variants. Currently, we cannot draw definitive conclusions about their connection.

Based on the functional differences described above, AidLocker appears to be a more sophisticated version of HellCat. This may suggest that AidLocker/Frag is a more recent, improved iteration of HellCat/Morpheus; though alternatively, HellCat/Morpheus could be a simplified, new version of AidLocker/Frag.

The table below summarizes the key differences between the main malware families. The "TimeDateStamp" information (assuming it wasn't manipulated) indicates that Frag first appeared in November 2024, followed by AidLocker, and then HellCat and Morpheus. This might indicate that HellCat/Morpheus is the most recent and active version. However, our friends at Infoguard shared with us — while we were finishing this article — that they observed AidLocker (sha256: c4b75817add2d8ecfe84c4f8d622fd18c7b70c3d834993c7db9e7293c8c76e8f) in an incident at the end of January 2025, proving that AidLocker remains active in the wild. This sample has a TimeDateStamp of 2025-01-11T21:54:45, suggesting it was built shortly before deployment.

All the variations we see between the samples could also be well explained by different variants generated by the same builder.

Frag AidLocker HellCat Morpheus
TimeDateStamp
(PE header)
2024-11-21T08:29:56 2024-12-14T18:53:19 2024-12-19T09:12:28 2024-12-19T09:12:28
VT First Seen Not found 2025-01-02 15:33:04 2025-01-24 17:39:43 2024-12-22 15:06:02
Ransom Note _README_.TXT README.TXT _README_.TXT _README_.TXT
Ransom File Extension ..frag .aid666 No Extension No Extension
Excluded Extensions .sys .exe .themepack .nls .diagpkg .msi .cab .scr .bat .drv .rtp .msp .prf .msc .ico .ocx .diagcab .diagcfg .pdb .wpx .hlp .icns .rom .dll .msstyles .mod .ics .cmd .ani .386 .cur .idx .sys .com .deskthemepack .shs .ldf .theme .mpa .nomedia .spl .cpl .adv .icl .msu .sys .exe .themepack .nls .diagpkg .msi .cab .scr .bat .drv .rtp .msp .prf .msc .ico .ocx .diagcab .diagcfg .pdb .wpx .hlp .icns .rom .dll .msstyles .mod .ics .cmd .ani .386 .cur .idx .sys .com .deskthemepack .shs .ldf .theme .mpa .nomedia .spl .cpl .adv .icl .msu .dll .sys .exe .drv .com .cat .dll .sys .exe .drv .com .cat
Excluded File Paths Multiple Multiple Only one (\Windows\System32) Only one (\Windows\System32)
Shadow Copy Delete Yes Yes No No
CMD argument checks Yes (-p -d -f -del -h) Yes (-p -d -f -del -h) No No
Terminate Process with File Handles Yes Yes No No

Appendix - Sample hashes

Sample name SHA256
HellCat 5b492a70c2bbded7286528316d402c89ae5514162d2988b17d6434ead5c8c274
Morpheus 93aa8b0f950a7ea7f0cee2ba106efaacf673bb2b504ca0b9e87f9ea41acfb599
AidLocker cedffb8a736fe221ef2df23cffcd190851739c99231456ec892bcc6fc99da5c5
Frag 711d5c83655fbf1a139dcaf91db06d158e1958a1edb8e4885b526c137abf5a69

Ready to find out how Threatray can protect your organization?

Talk to an expert