Threat intelligence

Hexamethy Ransomware Displays Scary Lock Screen During File Encryption

by Security News

The Sonicwall Capture Labs threat research team has recently observed new ransomware named HEXAMETHYLCYCLOTRISILOXANE, or Hexamethy in short.  This malware produces a scary cinematic display during the encryption process and flashes text stating, “No more files for you,” and “Your files are in hostage by the HEXAMETHYLCYCLOTRISILOXANE Ransomware." The threat actors demand 0.1 BTC, roughly $8400 USD at the time of writing, for a ransom payment. However, no operator contact information is provided for negotiation.

Infection Cycle

The malware uses the following icon:

1.png
Figure 1: Malware icon

Upon execution, files on the system are encrypted.  Each encrypted file is given a “.HXAMTHY” extension.

During the encryption process, the following text flashes by in quick succession on the screen:

2.png
Figure 2: Infection declaration screen

3.png
Figure 3: Infection declaration screen continued

4.png
Figure 4: Infection declaration screen continued

There is no conventional way to exit back to the desktop during this display.

After rebooting, the desktop background is changed:

5.png
Figure 5: Desktop background

Two files are now present on the desktop: “Hexamethy decryptor.exe” and “RAPIDOVERWRITER.exe”

“Hexamethy decryptor.exe” uses the following icon:

6.png
Figure 6: Decryptor icon

Running RAPIDOVERWRITER.exe leads to the following lock screen

7.png
Figure 7: RAPIDOVERWRITER lockscreen

Running “Hexamethy decryptor.exe” brings up the following dialog:

8.png
Figure 8: Decryption dialog

After decompiling the code, we can see its intent to disable Task Manager:

9.png
Figure 9: Disabling task manager

It sets itself up to run again after reboot:

10.png
Figure 10: Set up to run after reboot

It contains a list of directories to target for encryption and the file extension to use for encrypted files:

11.png
Figure 11: Targeted directories and file extension

This variant of the malware points to the publically known Bitcoin address of Satoshi, the founder of Bitcoin.  This is obviously not to be taken seriously and no Bitcoin should be deposited to this address as a ransom payment:

12.png
Figure 12: Satoshi’s Bitcoin address

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: Hexamethy.RSM (Trojan)

This threat is also detected by SonicWall Capture ATP w/RTDMI and the Capture Client endpoint solutions.

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Critical CrushFTP Authentication Bypass (CVE-2025-2825) Exposes Servers to Remote Attacks
    Read More
  • Critical Strapi Vulnerability Allows RCE via Server-Side Template Injection
    Read More