New ransomware strain believed to be fastest at executing encryption

April 4, 2023 A new strain of ransomware believed to be the fastest-executing encryption malware has been discovered.

Researchers at Check Point Software said today the strain, dubbed Rorschach, hit an unnamed U.S. company using a signed component of Palo Alto Networks’ Cortex XDR Dump Service Tool, version 7.3.0.16740.

The Rorschach ransomware employs a highly effective and fast hybrid-cryptography scheme, which blends the curve25519 and eSTREAM cipher hc-128 algorithms for encryption purposes, says the report. “This process only encrypts a specific portion of the original file content instead of the entire file.”

In a test on a server with six CPUs, 8192MB RAM and 220,000 files on a solid-state hard drive, it took Rorschach four minutes and 30 seconds to encrypt the data. By comparison, it took a sample of LockBit 3.0 seven minutes.

The researchers suspect this hybrid-cryptography routine was borrowed from the leaked source code of Babuk ransomware. The creators of Rorschach also appear to have been inspired by LockBit 2.0’s use of I/O Completion Ports for thread scheduling, the report says.

“Rorschach took the best from the ransomware families with the highest reputation and then added some unique features of its own,” the researchers conclude.

When initially executed on a Windows Domain Controller (DC), the ransomware automatically creates a Group Policy, spreading itself to other machines within the domain.

Similar functionality has been reported to be included in LockBit 2.0, the report says,  although Rorschach’s deployment is carried out differently. Rorschach copies its files into the scripts folder of the domain controller, and deletes them from the original location. It then creates a group policy that copies itself into the Windows %Public% folder of all workstations in the domain. The ransomware creates another group policy in an attempt to kill a list of predefined list of processes. This is done by creating a scheduled task invoking taskkill.exe. Finally, Rorschach creates a third group policy that registers a scheduled task which runs immediately and upon a user logging in, which runs Rorschach’s main executable with the relevant arguments.

Rorschach has a number of protections. The initial loader/injector, winutils.dll, is protected with UPX-style packing. However, says the report, this is changed in such a way that it isn’t readily unpacked using standard solutions, and requires manual unpacking. After unpacking, the sample loads and decrypts config.ini, which contains the ransomware logic.

After Rorschach is injected into notepad.exe, it’s still protected by VMProtect. This results in a crucial portion of the code being virtualized in addition to lacking an IAT table. Only after defeating both of these safeguards is it possible for researchers to properly analyze the ransomware logic.

Another way it evades detection is by making direct system calls using the “syscall” instruction. “While previously observed in other strains of malware, it’s quite startling to see this in ransomware,” says the report.

Before encrypting the target system, the sample runs two system checks to confirm the language of the infected computer. If the return value is commonly used in countries in the Russian-aligned Commonwealth of Independent States (CIS), including Russian and Ukrainian, it won’t execute.

“Our findings underscore the importance of maintaining strong cybersecurity measures to prevent ransomware attacks, as well as the need for continuous monitoring and analysis of new ransomware samples to stay ahead of evolving threats,” says the report. “As these attacks continue to grow in frequency and sophistication, it is essential for organizations to remain vigilant and proactive in their efforts to safeguard against these threats.”

The post New ransomware strain believed to be fastest at executing encryption first appeared on IT World Canada.

Top Stories

Related Articles

January 16, 2026 A newly uncovered malware framework suggests attackers are quietly preparing for a much deeper push into Linux more...

January 16, 2026 A massive trove of personal data belonging to thousands of U.S. immigration agents has reportedly been leaked more...

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

Picture of Howard Solomon

Howard Solomon

Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.
Picture of Howard Solomon

Howard Solomon

Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn