HellCat and Morpheus Ransomware

13436368679?profile=RESIZE_400xThe previous six months have seen heightened activity regarding new and emerging ransomware operations. Across the tail end of 2024 and into 2025, researchers have seen the rise of groups such as FunkSec, Nitrogen,, and Termite. In addition, we have seen the return of Cl0p and a new version of LockBit (aka LockBit 4.0).

Within this period of accelerated activity, the Ransomware-as-a-Service offerings HellCat and Morpheus have gained additional momentum and notoriety. Operators behind HellCat, in particular, have been vocal in their efforts to establish the RaaS as a ‘reputable’ brand and service within the crimeware economy.

As a result of this recent activity, we analyzed payloads from HellCat and Morpheus ransomware operations. This post discusses how affiliates across both operations compile payloads containing almost identical code. Sentinel Labs examines the characteristics and behavior of their

13436959672?profile=RESIZE_400xHellCat Overview—HellCat Ransomware emerged in mid-2024. The primary operators behind It are high-ranking members of the BreachForums community and its various factions. These personas, including Rey, Pryx, Grep, and IntelBroker, have been involved in the breaches of numerous high-value targets.

HellCat has leaned heavily into the public side of its persona, using novel ransom demands and direct media coverage to drive its position within the ransomware landscape. By their admission, HellCat operators are focused on high-value “big game” targets and government entities.

13437016880?profile=RESIZE_584xMorpheus Overview—Morpheus RaaS launched a data leaks site (DLS) in December 2024, though the group’s activity can be traced back to at least September. Morpheus functions as a semi-private RaaS, and its public branding efforts are far less visible than Hellcat's.
At this time, Morpheus has listed two victims in the pharmaceutical and manufacturing industries. The affiliate discussed below currently targets Italian organizations focusing on virtual ESXi environments. Ransom demands from Morpheus affiliates are known to reach as high as 32BTC (~ USD 3 million as of this writing).

An Affiliate in Common - In late December 2024, our research team observed two similar ransomware payloads uploaded to VirusTotal on December 22 and December 30.

SHA1 Filename Uploaded
f86324f889d078c00c2d071d6035072a0abb1f73 100M.exe December 22, 2024
b834d9dbe2aed69e0b1545890f0be6f89b2a53c7 100M_redacted.exe December 30, 2024

 

Both files were uploaded to VirusTotal via the web interface from a user who was not signed in and bore the same submitter ID. Based on this and other telemetry data, we believe it is likely that the samples were uploaded by the same affiliate dabbling in both Morpheus and HellCat campaigns.
13436991498?profile=RESIZE_710xHellCat VirusTotal Submission

13437099661?profile=RESIZE_710xMorpheus VirusTotal Submission
These two payload samples are identical except for victim-specific data and the attacker's contact details.

13437043296?profile=RESIZE_584xZoomed out comparison of payload binaries (differences highlighted)
13437099675?profile=RESIZE_710xZoomed in comparison of payload binaries (differences highlighted)

Payload Behavior - The Morpheus/HellCat payload is a 64-bit PE file. Both samples are ~18KB in size. Execution of the payload requires a path to be provided as an argument. The ww argument is also accepted, and this was the parameter used by the affiliate associated with these samples. A further file named er.bat was uploaded to VirusTotal with the same submitter ID on 31 December 2024 and gives us a glimpse into how the Morpheus sample was executed on target systems. er.bat (SHA1: f62d2038d00cb44c7cbd979355a9d060c10c9051 ) contains multiple copy commands, followed by execution of the ransomware.

13437120669?profile=RESIZE_710xer.bat launches Morpheus ransomware

Other files referenced in er.bat are associated with nginx (webserver) and various Trend Micro products. The script copies these items from a network share to the local C:\users\public\ folder, executing the Morpheus ransomware with the ww parameter. Both the HellCat and Morpheus samples are built with a hard-coded list of extensions to exclude from the encryption process:
• .dll
• .sys
• .exe
• .drv
• .com
• .cat
Additionally, the ransomware excludes the \Windows\System32 folder from encryption.
Upon launch, the payload processes files in the targeted path. An unusual characteristic of these Morpheus and HellCat payloads is that they do not alter the extension of targeted and encrypted files. The file contents will be encrypted, but file extensions and other metadata will remain intact after processing by the ransomware.

13437120686?profile=RESIZE_584xHellCat-encrypted files, no extension change

The Morpheus and HellCat samples use the Windows Cryptographic API for key generation and file encryption. BCrypt generates an encryption key, followed by encryption of the file's contents. Similar approaches to encryption (using the Windows Cryptographic API) have been taken in the past by early versions of LockBit and ALPHV, and many others.

13437140862?profile=RESIZE_584xHellCat key generation via BCrypt
The BCryptEncrypt is, in turn, used to encrypt the context of each file processed.

13437140882?profile=RESIZE_584xBCrypt / Windows Crypto use in HellCat/Morpheus

There are no further system modifications made beyond the file encryption and ransom note drop (no wallpaper change, schedule tasks, or persistence mechanisms)
For both Morpheus and HellCat, the ransom note is written to disk as _README_.txt. Once all available files on all available volumes have been processed, the ransomware note will be launched via Notepad from the C:\Users\Public\_README_.txt instance of the file.

13437159467?profile=RESIZE_584x13437169660?profile=RESIZE_584xDisplay of HellCat/Morpheus ransom note

Morpheus Ransom note displayed post-encryption
13437159485?profile=RESIZE_710xHellCat (left) and Morpheus (right) ransom notes

Ransom notes for the payloads are nearly identical and follow the same template and flow. The only differences are from the “Sources of Information” section onward.
Victim-specific infrastructure varies, but the layout within the note is the same, with the same quantity of sources listed across each note. The “Contacts” section contains the operation-specific contact details (HellCat or Morpheus), including the contact email address, .onion URL and victim login details. In each note, victims are instructed to login to the attacker’s .onion portal with a provided set of credentials.

13437169674?profile=RESIZE_710xAttackers' contact details are displayed in the ransom notes

Similarities with Underground Team Ransomware - Underground Team emerged as a RaaS operation in early to mid-2023. It is still active as of this writing, and the associated data leak site has entries as recently as December 2024.
13437169680?profile=RESIZE_584xUnderground Team data leak site as of January 2025

The ransom notes for HellCat and Morpheus described in the previous section follow the same template as the notes analyzed by the Underground Team.
13437220889?profile=RESIZE_710xUnderground Team ransom note

Despite this similarity, the ransomware payloads analyzed from the Underground Team are structurally and functionally different from HellCat and Morpheus samples. There is insufficient evidence to support any shared codebase or ‘partnering’ between Underground Team, HellCat, and Morpheus. While it is entirely possible that there are affiliates tied to Underground Team and Hellcat/Morpheus, assuming any deeper connection would be speculation at this time.

Conclusion - HellCat and Morpheus payloads are almost identical, and both are atypical to other ransomware families in that they leave original file extensions in place after encryption. While it is impossible to assess the full extent of interaction between the owners and operators of these ransomware services, a shared codebase or possibly a shared builder application is being leveraged by affiliates tied to both groups.

As these operations continue to compromise businesses and organizations, understanding how standard code is sourced and shared across these groups can help inform detection efforts and improve threat intelligence regarding how these groups operate.
Indicators of Compromise

Files (SHA1):
b834d9dbe2aed69e0b1545890f0be6f89b2a53c7 “HellCat”
f62d2038d00cb44c7cbd979355a9d060c10c9051 er.bat (Morpheus)
f86324f889d078c00c2d071d6035072a0abb1f73 “Morpheus”

Network:
hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad[.]onion HellCat DLS
izsp6ipui4ctgxfugbgtu65kzefrucltyfpbxplmfybl5swiadpljmyd[.]onion Morpheus DLS
hellcat[.]locker HellCat file service

Personas:
h3llr4ns[@]onionmail[.]com
morpheus[@]onionmail[.]com

 

This article is shared at no charge and is for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. Red Sky provides indicators of compromised information via a notification service (RedXray) or an analysis service (CTAC). For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225, or feedback@redskyalliance.com

• Reporting: https://www.redskyalliance.org/
• Website: https://www.redskyalliance.com/
• LinkedIn: https://www.linkedin.com/company/64265941

Weekly Cyber Intelligence Briefings
REDSHORTS - Weekly Cyber Intelligence Briefings
https://attendee.gotowebinar.com/register/5207428251321676122

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!