{
	"id": "abdcd4d3-4861-4e71-b5c8-3983c42b7df3",
	"created_at": "2026-04-06T00:19:04.578678Z",
	"updated_at": "2026-04-10T13:12:05.36828Z",
	"deleted_at": null,
	"sha1_hash": "66fc0d95191ef8b98cabd94dccd86630f8c84669",
	"title": "WORK Cryptomix Ransomware Variant Released",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 736784,
	"plain_text": "WORK Cryptomix Ransomware Variant Released\r\nBy Lawrence Abrams\r\nPublished: 2017-12-13 · Archived: 2026-04-05 18:24:36 UTC\r\nToday, BleepingComputer discovered a new variant of the CryptoMix ransomware that appends the .WORK extension to\r\nencrypted files and changes the contact emails used by the ransomware. \r\nIn this article I will provide a brief summary of any changes that have occurred in this new variant.  As we are always\r\nlooking for weaknesses, if you are a victim of this variant and decide to pay the ransom, please send us the decryptor so we\r\ncan take a look at it. You can also discuss or receive support for Cryptomix ransomware infections in our dedicated\r\nCryptomix Help \u0026 Support Topic.\r\nChanges in the WORK Cryptomix Ransomware Variant\r\nWhile the encryption methods stay the same in this variant, there have been some slight differences. The ransom note is still\r\nnamed _HELP_INSTRUCTION.TXT, but now uses the worknow@keemail.me, worknow@protonmail.com,\r\nworknow8@yandex.com, worknow9@yandex.com, and worknow@techie.com emails for a victim to contact for\r\npayment information.\r\nWORK CryptoMix Ransom Note\r\nThe next noticeable change is the extension appended to encrypted files. With this version, when a file is encrypted by the\r\nransomware, it will modify the filename and then append the .WORK extension to encrypted file's name. For example,\r\na test file encrypted by this variant has an encrypted file name of 0D0A516824060636C21EC8BC280FEA12.WORK.\r\nhttps://www.bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/\r\nPage 1 of 5\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/\r\nPage 2 of 5\n\nVisit Advertiser websiteGO TO PAGE\r\nFolder of Encrypted WORK Files\r\nAs this is just a cursory analysis of this new variant, if anything else is discovered, we will be sure to update this article.\r\nHow to protect yourself from the WORK CryptoMix Ransomware\r\nIn order to protect yourself from ransomware, it is important that you use good computing habits and security software. First\r\nand foremost, you should always have a reliable and tested backup of your data that can be restored in the case of an\r\nemergency, such as a ransomware attack.\r\nYou should also have security software that incorporates behavioral detections to combat ransomware and not just signature\r\ndetections or heuristics.  For example, Emsisoft Anti-Malware and Malwarebytes Anti-Malware both contain behavioral\r\ndetection that can prevent many, if not most, ransomware infections from encrypting a computer.\r\nLast, but not least, make sure you practice the following security habits, which in many cases are the most important steps of\r\nall:\r\nBackup, Backup, Backup!\r\nDo not open attachments if you do not know who sent them.\r\nDo not open attachments until you confirm that the person actually sent you them,\r\nScan attachments with tools like VirusTotal.\r\nMake sure all Windows updates are installed as soon as they come out! Also make sure you update all programs,\r\nespecially Java, Flash, and Adobe Reader. Older programs contain security vulnerabilities that are commonly\r\nexploited by malware distributors. Therefore it is important to keep them updated.\r\nMake sure you use have some sort of security software installed that uses behavioral detections or white list\r\ntechnology. White listing can be a pain to train, but if your willing to stock with it, could have the biggest payoffs.\r\nUse hard passwords and never reuse the same password at multiple sites.\r\nFor a complete guide on ransomware protection, you visit our How to Protect and Harden a Computer against\r\nRansomware article.\r\nIOCs\r\nFile Hashes:\r\nSHA256: 69fa88c5b353f55edbb7187c090bee377e54900e1c78c580d7b3b3084c9d7d0b\r\nhttps://www.bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/\r\nPage 3 of 5\n\nFilenames associated with the WORK Cryptomix Variant:\r\n_HELP_INSTRUCTION.TXT\r\nC:\\ProgramData\\[random].exe\r\nWORK Ransom Note Text:\r\nAttention! All Your data was encrypted!\r\nFor specific informartion, please send us an email with Your ID number:\r\nworknow@keemail.me\r\nworknow@protonmail.com\r\nworknow8@yandex.com\r\nworknow9@yandex.com\r\nworknow@techie.com\r\nPlease send email to all email addresses! We will help You as soon as possible!\r\nIMPORTANT: DO NOT USE ANY PUBLIC SOFTWARE! IT MAY DAMAGE YOUR DATA FOREVER!\r\nDECRYPT-ID-[id] number\r\nEmails Associated with the WORK Ransomware:\r\nworknow@keemail.me\r\nworknow@protonmail.com\r\nworknow8@yandex.com\r\nworknow9@yandex.com\r\nworknow@techie.com\r\nExecuted Commands:\r\nsc stop VVS\r\nsc stop wscsvc\r\nsc stop WinDefend\r\nsc stop wuauserv\r\nsc stop BITS\r\nsc stop ERSvc\r\nsc stop WerSvc\r\ncmd.exe /C bcdedit /set {default} recoveryenabled No\r\ncmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures\r\nC:\\Windows\\System32\\cmd.exe\" /C vssadmin.exe Delete Shadows /All /Quiet\r\nhttps://www.bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/\r\nPage 4 of 5\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/\r\nhttps://www.bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/work-cryptomix-ransomware-variant-released/"
	],
	"report_names": [
		"work-cryptomix-ransomware-variant-released"
	],
	"threat_actors": [],
	"ts_created_at": 1775434744,
	"ts_updated_at": 1775826725,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/66fc0d95191ef8b98cabd94dccd86630f8c84669.pdf",
		"text": "https://archive.orkl.eu/66fc0d95191ef8b98cabd94dccd86630f8c84669.txt",
		"img": "https://archive.orkl.eu/66fc0d95191ef8b98cabd94dccd86630f8c84669.jpg"
	}
}