LMAOxUS Ransomware: Another Case of Weaponized Open Source Ransomware

Share this…

An Indian developer is playing around with an open source ransomware builder, which in the long run may end up causing serious problems for innocent users.

This developer, who goes by the nickname of Empinel and claims to be based in Mumbai, has forked the open source code of the EDA2 project, and with the help of another user, has removed the backdoor hidden in EDA2’s original code.

His work started back in May 2016, when he tinkered with EDA2’s source code and renamed the project to Stolich, modifying certain aspects of EDA2’s encryption.

He received help in September 2016 when another “friendly” developer pushed a pull request to the Stolich repo that removed the EDA2 backdoor code.

Stolich GitHub repo

While people work on malware code on GitHub all the time, a fully-functional version of the EDA2-based Stolich ransomware popped up on VirusTotal two days ago.

Stolich used in “production”

Seeing Stolich on VirusTotal wasn’t a surprise in the beginning since many developers upload their code on VirusTotal for a quick detection test.

The surprise came when researchers realized that the version that reached VirusTotal had its code obfuscated with an evaluation version of the CryptoObfuscator code obfuscation utility, according to MalwareHunter.

No developer bothers hiding open source ransomware code — that’s also readily available on GitHub — behind a code obfuscator unless they mean to get down to business and distribute a weaponized version.

This first weaponized version of Stolich that was uploaded on VirusTotal, outside the code obfuscation, was a near carbon copy of the original Stolich version still present on GitHub. This meant the same backend code, ransom note, ransom wallpaper, and placeholder Bitcoin address (the one seized by the FBI in the SilkRoad case).

Stolich wallpaper

Stolich ransom demand

At this point, everyone hoped this was just a random test. A kid playing with ransomware he found on GitHub. Unfortunately, this was not the case.

New in-dev LMAOxUS ransomware discovered

A day later, security researcher Jack from MalwareForMe discovered an improved Stolich-based ransomware, now rebranded as LMAOxUS ransomware.

The changes in LMAOxUS were many, and included new ransom graphics for the backend portal, the ransom note, the ransom wallpaper, and a unique Bitcoin and email address for handling ransom payments.

LMAOxUS wallpaper

LMAOxUS ransom demands

Just like Stolich, the LMAOxUS ransomware wasn’t a casual detection test. The LMAOxUS version was hidden inside a Minecraft launcher, meaning someone was testing a fully-weaponized binary in an attempt to see if VirusTotal would still detect his hidden payload (thankfully, it did, and pretty well: 38 AVs out of 62).

Minecraft launcher app

Right now, LMAOxUS looks like another in-testing ransomware created on top of the EDA2 project. Nevertheless, the person behind it has already registered a special domain to host his backend.

LMAOxUS payment site

Empinel the author of LMAOxUS? Probably not!

We don’t have any evidence to sustain a claim that Empinel is behind the LMAOxUS ransomware. From the clues we found online, Empinel appears to have been more interested in showing off his coding skills.

Three days after he forked the EDA2 project and on the same day he finished tuning it up, he went on the BitcoinTalk forum to brag about his creation and ask others to review his project.

Forum plea

Similarly, Empinel took the time to customize the EDA2 default ransom note and add a braggadocio message at the end, addressed personally to Utku Sen, EDA2’s creator.

Message for Utku

For all we can tell, Empinel didn’t even know about the EDA2 backend panel backdoor until September 2016, when another user pushed modifications to his code.

We don’t know if this second individual is the same man who’s behind the LMAOxUS ransomware, but the presence of the EDA2 backdoor has been known to the public since early 2016, which speaks to Empinel’s (lack of) knowledge of the ransomware scene.

When open source ransomware goes terribly wrong

The story of EDA2 is why open source ransomware is a terrible idea. Launched in late 2015, EDA2 is the work of Turkish developer Utku Sen, the same man who created the Hidden Tear open source ransomware building kit.

Both EDA2 and Hidden Tear were one of the first open source ransomware kits on the market, and according to this ransomware index put together by security researcher Nyxbone, have been used as the base for many of today’s ransomware threats.

Despite doing his best to hide it, crooks quickly discovered Utku Sen’s backdoors left in Hidden Tear’s encryption routine and in EDA2’s backend panel. Most of the weaponized EDA2 and Hidden Tear variants don’t feature those flaws. We only know of one case where the EDA2 backdoor was ever used.

After getting blackmailed by a ransomware developer on the Bleeping Computer forums, Utku Sen eventually removed both projects from GitHub, but by that time, they had been forked tens of times.

The impact of these tools is still relevant today via Empinel’s actions. Without having any previous expertise with ransomware development, this Indian developer was able to put together a modified and fully functional ransomware in three days, all thanks to the pre-existing EDA2 codebase.

Imagine what a more skilled actor would be capable of doing with this code, which was initially released “for educational use only.”

Whatever Utku’s intentions for EDA2 and Hidden Tear, the fact remains that he only managed to make the job of ransomware operators much easier, not tougher.

The only “education” the infosec community, and especially ransomware victims, got is that: Open source ransomware is bad, mkay!

So stop creating more of it!


Binary for first Stolich:


Binary for LMAUxUS binary:


Email address used in LMAOxUS ransom note:


LMAOxUS extension added at the end of files:


Text-based ransom note:

You've been rekt by LMAOxUS. your Personal Identifier is 1111111111. Keep it handy if you want your data. 
 Visit .... for more info.
 Your expiration date is: 4/6/2017 10:08:41 AM

LMAOxUS ransom note