top of page
perceptive_background_267k.jpg

AI-generated Slopoly malware used in Interlock ransomware attack

Published:

12 maart 2026 om 20:01:27

Alert date:

12 maart 2026 om 21:01:52

Source:

bleepingcomputer.com

Click to open the original link from this advisory

Ransomware & Malware, Emerging Technologies, Data Breach & Exfiltration

A new AI-generated malware strain called Slopoly was used in an Interlock ransomware attack. The malware allowed threat actors to maintain persistence on a compromised server for over a week. During this time, the attackers were able to steal data before deploying the ransomware. The Slopoly malware appears to have been created using generative AI tools, representing an evolution in how cybercriminals are developing malicious software. This incident demonstrates the growing sophistication of ransomware operations and the integration of AI technologies in cyberattacks.

Technical details

Slopoly is an AI-generated malware strain used as a PowerShell backdoor client for C2 frameworks. It was likely created using Large Language Models (LLM) as evidenced by extensive code commentary, structured logging, error handling, and clearly named variables. The malware deploys in C:\ProgramData\Microsoft\Windows\Runtime\ and functions include: collecting system information, sending heartbeat beacons every 30 seconds to /api/commands, polling for commands every 50 seconds, executing commands via cmd.exe, maintaining persistence.log files, and establishing persistence through a scheduled task named 'Runtime Broker'. It supports downloading and executing EXE/DLL/JavaScript payloads, running shell commands, changing beaconing intervals, updating itself, and process termination. The attack chain starts with ClickFix social engineering and deploys multiple components including NodeSnake and InterlockRAT backdoors. Interlock ransomware is a 64-bit Windows executable delivered via JunkFiction loader, running as SYSTEM scheduled task, using Windows Restart Manager API to release locked files and appending '.!NT3RLOCK' or '.int3R1Ock' extensions to encrypted files.

Mitigation steps:

Monitor for suspicious PowerShell scripts in C:\ProgramData\Microsoft\Windows\Runtime\ directory, detect scheduled tasks named 'Runtime Broker', monitor network traffic to /api/commands endpoints with 30-50 second intervals, watch for files with .!NT3RLOCK or .int3R1Ock extensions, implement detection for ClickFix social engineering campaigns, monitor for persistence.log file creation, detect JunkFiction loader activity, watch for NodeSnake and InterlockRAT backdoor indicators

Affected products:

Windows operating systems
PowerShell
cmd.exe
Windows Task Scheduler
Windows Restart Manager API

Related links:

Related CVE's:

Related threat actors:

IOC's:

C:\ProgramData\Microsoft\Windows\Runtime\, /api/commands, Runtime Broker, persistence.log, .!NT3RLOCK, .int3R1Ock, JunkFiction loader, NodeSnake backdoor, InterlockRAT backdoor

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page