Skip to main content

Interlock ransomware evolving under the radar

Medium
Published: Wed Apr 16 2025 (04/16/2025, 14:00:11 UTC)
Source: AlienVault OTX

Description

The Interlock ransomware group, active since September 2024, has shown adaptability and innovation in its tactics despite a relatively low victim count. They employ fake browser updates and the ClickFix technique for initial access, followed by a multi-stage attack chain involving PowerShell backdoors, credential stealers, and a custom Remote Access Trojan. The group targets various sectors across North America and Europe, conducting Big Game Hunting and double extortion campaigns. Interlock has been observed improving their tools, including evolving their PowerShell backdoor and modifying their ransom notes to emphasize legal repercussions. The group's focus on maintaining relevance while avoiding large-scale visibility suggests a strategic approach to their operations.

AI-Powered Analysis

AILast updated: 06/19/2025, 18:16:55 UTC

Technical Analysis

The Interlock ransomware group, active since September 2024, represents a sophisticated and evolving threat actor specializing in targeted ransomware attacks, often referred to as Big Game Hunting. Despite maintaining a relatively low victim count, Interlock demonstrates significant adaptability and innovation in its attack methodologies. Initial access is typically gained through social engineering tactics such as fake browser updates and exploitation of the ClickFix technique, which is known for leveraging vulnerabilities in user interaction flows to deploy malicious payloads. Once inside a network, the group employs a multi-stage attack chain that includes deploying PowerShell backdoors, which allow stealthy and persistent command execution within compromised environments. Additionally, they utilize credential stealers, notably the Berserk Stealer, to harvest sensitive authentication data, facilitating lateral movement and privilege escalation. A custom Remote Access Trojan (RAT), referred to as the Interlock RAT, is also deployed to maintain long-term access and control over infected systems. The group’s operational tactics include double extortion, where data is not only encrypted but also exfiltrated, with threats to leak sensitive information if ransom demands are not met. This approach increases pressure on victims to comply. Interlock has been observed refining their tools continuously, including enhancements to their PowerShell backdoor capabilities and modifications to ransom notes to emphasize potential legal consequences, likely as a psychological tactic to coerce victims. Their strategic focus on avoiding large-scale visibility while maintaining operational effectiveness suggests a deliberate effort to evade detection and prolong their campaigns. The group targets multiple sectors across North America and Europe, indicating a broad geographic and vertical scope.

Potential Impact

For European organizations, the Interlock ransomware group poses a significant risk, particularly to high-value targets such as critical infrastructure, financial institutions, healthcare providers, and large enterprises. The use of credential stealers and PowerShell backdoors can lead to extensive network compromise, data breaches, and operational disruption. The double extortion tactic exacerbates the impact by threatening data confidentiality and potentially causing reputational damage and regulatory penalties under GDPR. The stealthy nature of their attacks and continuous tool evolution complicate detection and response efforts. Organizations may face prolonged downtime, costly incident response, and potential legal liabilities. The emphasis on legal repercussions in ransom notes may increase psychological pressure on European victims, potentially influencing ransom payment decisions. Given the group's focus on Big Game Hunting, large organizations with complex IT environments are at heightened risk, especially those with insufficient segmentation and outdated detection capabilities.

Mitigation Recommendations

European organizations should implement targeted defenses against the specific tactics employed by Interlock. This includes rigorous user awareness training focused on recognizing fake browser updates and social engineering attempts. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying suspicious PowerShell activity and anomalous credential access patterns. Network segmentation should be enforced to limit lateral movement, alongside strict access controls and multi-factor authentication to mitigate credential theft impacts. Regularly audit and monitor PowerShell logs and employ application whitelisting to restrict unauthorized script execution. Incident response plans must incorporate scenarios involving double extortion ransomware, including secure offline backups and data exfiltration detection capabilities. Organizations should also engage in threat intelligence sharing to stay updated on Interlock’s evolving tactics. Given the absence of patches, proactive threat hunting for indicators of compromise related to Interlock’s tools, such as the Interlock RAT and Berserk Stealer, is critical. Legal and compliance teams should prepare for potential data breach notifications and coordinate with law enforcement as appropriate.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar"]
Adversary
Interlock

Indicators of Compromise

Hash

ValueDescriptionCopy
hash008a8c6d9e40a2a4d3a4f5eaae933458
hash0370bb98a484927c0f92d56dc4df570b
hash0952cf9ce25dbfb02211ce61f5db7e47
hash0be5482af8c6870747807965eb630e12
hash0c9a6ae1bda14f96ce7b9d88887d764c
hash184037959e93d3bc03ace947c4585f1f
hash194caa8fac0504df0a2e2db915bc4f23
hash1d19112b64c20319270a29785f518c10
hash1ec0fd382727a099214801b0734ab7a2
hash2aa92c59e9578ca3df36abedc126c8c0
hash36603966a6a70eab4b1584620c1bd84a
hash3f137dc2b12e814cbd21494f4903303b
hash42cd1fedca04622419429080e92c03ef
hash4435a7326a011633c755976466405b08
hash451886c420f85eba28c3a3cd477c7ab7
hash4db4b2463cc95483b7c6a2539caee516
hash4f0e732b9faf24c2e09cea6dbb56cc1c
hash5268d1d538d99f10da94b3d1649fbe72
hash587fa2970c19cd55bc4c2bbe984d731f
hash631d393910f71724d0f295e38898c986
hash658d49874a0a8f1db4387e4ba43ab3d3
hash686c57adc6199971e61975983752f24f
hash6c3b2558fc8cfcb2751437b6e5cdeb6f
hash8bf60bab86b0f501aecd48308b1d2c18
hashbf70fb955bf138a71be3018a6a03c347
hashc1846f9b6ea365c61dbc7c2c9b0e44c0
hashd5821c3e83a71698667038ff954f31f5
hashea937d71ab96f033f9d7af4ebba2dc52
hashf053612bca3337a2abb20ed65c1534b7
hashf4ae10ad2532db6496e2e0f70d694b88
hashf76d907ca3817a8b2967790315265469
hashf7f679420671b7e18677831d4d276277
hash17fea856119b6b332c94218e07f6d3dd7dfd0664
hash1cb6a93e6d2d86d3479a1ea59f7d5b258f1c5c53
hash25892dd9cb2ac5b6a84a995c828739751543c3e4
hash277a4203fcf20e87f2748fe58bbe8eb3c5c21162
hash28c2d7a25ae0c25b1cef31b7407b40cf59c11c88
hash2950e67318b9aef887cb50b7a97de5365e3c20ae
hash37d3c9b5e1e0f70c24a990c75e37953639017098
hash3e4b50269bc38cd14aa7472280ad804224a8700c
hash42c0af54d2485393576def0611ff7949f5b9a7dd
hash453584d662d9f70fac8b74f1fd4ac448509da205
hash4ed5f0174326c083ac179de9fc8005ffc4540b35
hash599556ce6782fd0e0f8c0c9fd75914a735780e13
hash6a03f47be9732608c89b5143803c68bd9b30ce40
hash6fe749873d6ec0976d0d8262878a8772671e21b8
hash71930c3445ab4271ab00bf4d680171b5256c2f12
hash79fbf19fd5624b7a3dc8e182d9944d6ddb167188
hash88bf4231b0da780c0ff3e4b0ea71e2c14633cf8c
hash8a38825ee33980a27ab6970e090a30a46226f752
hash9336064f299c05ee8e66c54bb6f3a97304c4b804
hasha8007339971f9ab233b5f73155f2f5035e7cdac6
hashab8363fd61d12a0091a57b51d18c5c8f0df3ebf0
hashbe16f74dea803fda9e2f6bcc040e40ae02017dd4
hashbeb89417e1587d99bac37ae65523e2aa23a985bb
hashc9afa10c847371831cdeb60a4161099e85f04d2b
hashd649115e5b88ab5ddf3ea3aa8782f842da230b24
hashde7426152612bdd93daae660e7639c8f98f4f6ce
hashe098b045c6ba54fcb46ce2e8af65188de95be6c6
hashe5b447528cd3bc2a3c4e1fe41c192ca22f11142d
hashf12ab7a8d73c04fe2162a0ba67463be2766204a0
hashf988b144d8df1fd09055c170a2b7297788c96b4f
hashfdaaede04ad1cceed53772207b045a4f53902b18
hashff984232ea617e230a38633055cbfcebace05117
hash045c041354a6d6b47e91e1124a7dc77397c18e0695ccbc73f87b12a0a1079d46
hash04bae0045b86456d6000378a2e37d58b1fa617101543ad23bcec862300b87be3
hash05c99f2c1a218ce4a985fd03a3a510c2eaf08ef4772f93ef4f2d5da6cd9b86a1
hash074d26b9b128be8e4a77d73dcac31307f28b0e8b8097622c02267be349fe4b4f
hash09793a85d372f044fe53c4b47c47049c6bc13d1141334727800b2e32e6d92342
hash0e0a647b3156d430cd70ad5a430277dc99014d069940a64d9db1ecd60ca00467
hash0fff8fb05cee8dc4a4f7a8f23fa2d67571f360a3025b6d515f9ef37dfdb4e2ea
hash1105a3050e6c842fb9411d4f21fd6fdb119861c15f7743e244180a4e64b19b83
hash17db9d121fb3eb5033307fdb53df67402bcbc9d8970f45d8142b78c83769b7af
hash1f568c2eaa8325bf7afcf7a90f9595f8b601a085769a44c4ffa1cdfdd283594c
hash25a1d86248b7cf5f870dbc9960ce336266473bd40be3a8dcb35e6be88c9df261
hash28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f
hash299a8ef490076664675e3b52d6767bf89ddfa6accf291818c537a600a96290d2
hash2f03b5d1081dfde3d1296dace404b362188b4a941530746d7b14711b42bc53ad
hash2faef6a1a0c00f8d44955c243df3c098f0fccd20c59677d274a43023002a4e90
hash31f49c74046cc61bf102f3b9f2ce06471b0372d794139325e71c2dacca7bd00a
hash33dc991e61ba714812aa536821b073e4274951a1e4a9bc68f71a802d034f4fb9
hash351b8a0081fd9f5c35497f5183fb14aef73c1af75628ae689c9218689db01cd9
hash39539766ae8f5256e6f21d853b8b7ea8f003d29f6d7cd57d1ecb621dc2b97c89
hash3a560ca66f61ba5dceb6016703e0346ff8fe1144bd356a40f740149a2a878fe5
hash464ca510a465a38689bd61988b7d366a8fd7e26ca805850b3adb418e95307601
hash4672fe8b37b71be834825a2477d956e0f76f7d2016c194f1538139d21703fd6e
hash4a97599ff5823166112d9221d0e824af7896f6ca40cd3948ec129533787a3ea9
hash5627457a12c562b7a08f634878758d268b9fde44ce35292e887ca13741c5f942
hash576d07cc8919c68914bf08663e0afd00d9f9fbf5263b5cccbded5d373905a296
hash58ed0431455a1d354369206a1197d1acfcd3e0946cdc733bee50573867fda444
hash5c697162527a468a52c9e7b7dc3257dae4ae5142db62257753969d47f1db533e
hash5cbc2ae758043bb58664c28f32136e9cada50a8dc36c69670ddef0a3ef6757d8
hash60af8899b49013e9deb1d5cac58562d7ed12bfda1187627e9d25714b26218f0d
hash61d092e5c7c8200377a8bd9c10288c2766186a11153dcaa04ae9d1200db7b1c5
hash61f8224108602eb1f74cb525731c9937c2ffd9a7654cb0257624507c0fdb5610
hash62971070d6a8b9fca8a50b9cd8e91545bfcc2c2b6665f134c112081f54e6bf31
hash68366ced818508de187167d8f9106be7801b8dcf1f03ae169459c7336d6e69de
hash6e4ca569ab809ba3545860d26180316366803c231a2e3a66b4906adc5826a397
hash71f773b4e9178dcedd402c94fb9384aea6312d8a93f95f3f9dc1249fd4933658
hash7501623230eef2f6125dcf5b5d867991bdf333d878706d77c1690b632195c3ff
hash7890b116d13a52efe696ce1e2c0ed83029775cf4bea836ce551e71d222ee116f
hash7d9f3701bf6f43ab84ce02ce4915dc0703504263db2e1eb65f4f7c791565f731
hash8251186b3196e3fefb0dbfcf71dfccc2c1cd66515686c9af8a6fb48766c739c6
hash888842bc1f6fcb354431919080858c623def305bed2214f11b93591859d4dee2
hash8e273e1e65b337ad8d3b2dec6264ed90d1d0662bd04d92cbd02943a7e12df95a
hash9031652af104aa207d6dad1c402db86c557323b2567c0cc93d022f01ae926e9a
hash91fcf70c1775dcaaaa4d3de17d87d67976b0cec9939dedfb86f093ab388ed3b0
hash958ff93e92ee8bed7819555603ea612f263c1b9c673566f5c506288b5318eff8
hash9e387f1564f9e38ba87dbafbde3731db2e844ff3800500d6707028bb065c070b
hasha26f0a2da63a838161a7d335aaa5e4b314a232acc15dcabdb6f6dbec63cda642
hasha5623b6a6f289bb328e4007385bdb1659407a9e825990a0faaef3625a2e782cf
hasha760e28145620fccd072a415031cec4036fc09e8530c93d85f5d1509d62fe551
hashb35da0c1a515286a2b3021cf518140a59a63b470a9d611303304918be9354d68
hashb36c20c757c4780f89272ce224a29a5a61b62733367893574196debde19383fe
hashb3a512b9f4705d1947fbbbc42accdbd6bd95af1b07cec09d75af501746fecdd5
hashb85586f95412bc69f3dceb0539f27c79c74e318b249554f0eace45f3f073c039
hashbe6e5cede4e6a8b807062db211eb3e8825a6cc00d71ddf7bcd63971d76219a25
hashc9920e995fbc98cd3883ef4c4520300d5e82bab5d2a5c781e9e9fe694a43e82f
hashd1cd8c4574c3290ae16bf4e718c5e89dadef5b2fd4eea2211a19a6180ff8ee5b
hashd4f3d0446e08dbf1a7ccb6da09e756ff75eae3b04dafe2c2a69d6919052d2ebf
hashdee5915b76dd3bae3d3cedc0c1d1b055daab5852cba4868c92eb88b9a84a0b00
hashdf41085a8aa9ee9da6a03db08ad910b6ef5fcdc8fee7ebb19744331c5e70c782
hashe307d3e9b8de59311c692b2ab0ee864f0d469066e041141d577b65b43a4b3ffa
hashe668e30b4e111e16b4017cd49dd90c39f9988f8a44cd9cc16b95b7b451862b74
hashe69491a61ebc4a9ffc17884063c69a5489a83dd6d71295b4216962a43242a6c8
hasheaca86a3f397d10d9188be9fcd2af1a7a30a9b573b2282b0b8300efeb5ff1efd
hasheb1cdf3118271d754cf0a1777652f83c3d11dc1f9a2b51e81e37602c43b47692
hasheb587b2603dfc14b420865bb862fc905cb85fe7b4b5a781a19929fc2da88eb34
hashf02622129e7774b7673e2a9f62bb4a208d4a142b5d925532c7920481549bd07b
hashf1df43fe0f95de6badfb710827cdc7272e6654f108ef2cfcb2a01aca089f0624
hashf613966b6ed1f080aacba005b1e48268ef662fffdf9894382299645f42900848
hashf6c7ecff7b07cba12bd79833a23d12d5fcd12a75a3394d923b994ba0ed535db3
hashf962e15c6efebb3c29fe399bb168066042b616affddd83f72570c979184ec55c
hashfdd4e0bb2a4475e4e44154d7bf29490de98496553af3c8807f999ab8b920263f
hash05d849fee782da2f7455995585a549f134ef2e3c
hash0a33d0cbfe206a9f8853fbcd7beccb05f5722d11
hash743be93af36f51283a4b6e470d09d235e3f8eeeb
hashc0803468951064865186780201d348e38465afc5
hashd989ecca44efd8aeb5ed69120d404553312afc07

Url

ValueDescriptionCopy
urlhttp://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion
urlhttp://topsportracing.com/az10
urlhttp://topsportracing.com/wp-25
urlhttp://topsportracing.com/wp-az
urlhttps://advanceipscaner.com/additional-check.html
urlhttps://airbluefootgear.com/wp-includes/images/xits.php
urlhttps://album-anthony-rn-submission.trycloudflare.com/25423565
urlhttps://apple-online.shop/ChromeSetup.exe
urlhttps://apple-online.shop/MSTeamsSetup.exe
urlhttps://apple-online.shop/MicrosoftEdgeSetup.exe
urlhttps://dc-broader-green-norwegian.trycloudflare.com/12341234
urlhttps://diff-beats-belize-chapter.trycloudflare.com/12341234
urlhttps://ecologilives.com/additional-check.html
urlhttps://forest-offensive-height-letters.trycloudflare.com/12341234
urlhttps://lcd-add-palace-switching.trycloudflare.com/12341234
urlhttps://metro-offset-imposed-behind.trycloudflare.com/ytjstast
urlhttps://microsoft-msteams.com/additional-check.html
urlhttps://microstteams.com/additional-check.html
urlhttps://phones-pichunter-businesses-drop.trycloudflare.com/12341234
urlhttps://pub-motorola-viking-charger.trycloudflare.com/12341234
urlhttps://santa-reflection-capitol-classifieds.trycloudflare.com/12341234
urlhttps://spa-step-hopkins-islands.trycloudflare.com/erfgtrtt

Domain

ValueDescriptionCopy
domainadvanceipscaner.com
domainebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid.onion
domainecologilives.com
domainmicrosoft-msteams.com
domainmicrostteams.com
domainalbum-anthony-rn-submission.trycloudflare.com
domainanalytical-russell-cincinnati-settings.trycloudflare.com
domainbristol-weed-martin-know.trycloudflare.com
domaincalifornia-appeals-pilot-harper.trycloudflare.com
domaincasting-advisors-older-invitations.trycloudflare.com
domaincomplement-parliamentary-chairs-hc.trycloudflare.com
domaindc-broader-green-norwegian.trycloudflare.com
domaindiff-beats-belize-chapter.trycloudflare.com
domainforest-offensive-height-letters.trycloudflare.com
domainfotos-phillips-princess-baker.trycloudflare.com
domaininvestigators-boxing-trademark-threatened.trycloudflare.com
domainlancaster-sean-initial-ru.trycloudflare.com
domainlcd-add-palace-switching.trycloudflare.com
domainmedicine-podcasts-halo-expected.trycloudflare.com
domainmetro-offset-imposed-behind.trycloudflare.com
domainmortgage-i-concrete-origins.trycloudflare.com
domainmusicians-implied-less-model.trycloudflare.com
domainopen-exceptions-cleared-feelings.trycloudflare.com
domainphones-pichunter-businesses-drop.trycloudflare.com
domainphoto-auction-visual-gains.trycloudflare.com
domainpipe-hawaii-monkey-automatic.trycloudflare.com
domainpub-motorola-viking-charger.trycloudflare.com
domainrefrigerator-cheers-indicator-ferrari.trycloudflare.com
domainsanta-reflection-capitol-classifieds.trycloudflare.com
domainscientific-shown-desperate-ratio.trycloudflare.com
domainsecurities-variance-vocal-temporal.trycloudflare.com
domainspa-step-hopkins-islands.trycloudflare.com
domainspeak-head-somebody-stays.trycloudflare.com
domainstrain-brighton-focused-kw.trycloudflare.com
domainsublime-forecasts-pale-scored.trycloudflare.com
domainsuffering-arnold-satisfaction-prior.trycloudflare.com
domainuna-idol-ta-missile.trycloudflare.com
domainviews-ethics-orientation-roommate.trycloudflare.com
domainwashing-cartridges-watts-flags.trycloudflare.com
domainwww.sublime-forecasts-pale-scored.trycloudflare.com

Threat ID: 682c992c7960f6956616a50b

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 6/19/2025, 6:16:55 PM

Last updated: 8/18/2025, 2:31:23 AM

Views: 564

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats