Ransomware - Brain Cipher

Brain Cipher (Active)
Decryptor Available
No
Description

Brain Cipher is a ransomware operation utilizing the leaked LockBit 3.0 (Black) builder for its encryptor. This encryptor hasn't been tweaked much and uses the same encryption type - Salsa20 to encrypt files and RSA-1024 to encrypt the Salsa20 key. Additionally, the encrypted files follow the same format as LockBit 3.0 too, changing encrypted file's names to a seven alphanumeric character sequence followed by a nine alphanumeric character file extension.

They first came known after extorting the Indonesian government in mid-June 2024 and demanded an $8 million ransom. Although, we've observed extortions in the lower six figures. This suggests they aren't consistently demanding exorbitant ransom demands. Although, the subset of evidence for this claim is still small. We managed to get one of the BTC wallet addresses from the operators and it never had any transactions, which means it's possible the group isn't receiving as many funds as they would like. It's not uncommon for these threat actors to use several different wallets in these types of attacks.

Ransomware Type
Crypto-Ransomware
Data Broker
First Seen
Lineage
Extortion Types
Direct Extortion
Extortion Amounts
Amount
$150,000
131,000,000,000IDR($8,000,000)
Communication
Medium
Identifier
TOR
Tox
Encryption
Type
Hybrid
Files
Salsa20
Key
RSA-1024
Crypto Wallets
Blockchain Type
Crypto Wallet
BTC
bc1qqjzd8jrcvz5tl895uvgy6ph83g7sh06uzu6vn8
File Extension
<7 random alphanumeric characters>.<9 random alphanumeric characters>
Ransom Note Name
<9 random alphanumeric characters>.README.txt
How To Restore Your Files.txt
Ransom Note Image
Samples (SHA-256)
eb82946fa0de261e92f8f60aa878c9fef9ebb34fdababa66995403b110118b12
Known Victims
Industry Sector Country Extortion Date Amount (USD)
GovernmentIndonesia 131000000000 IDR($8,000,000)