Import.mdf.mallox Page
Likely a combination of AES-256 and RSA-2048. Payload Behavior: Terminates database processes to release file locks. Encrypts files and appends .import.mdf.mallox .
Below is a drafted template you can use to document the situation. Incident Analysis Report: Mallox Ransomware Infection
Check for (though Mallox often attempts to delete these). Prepare for restoration from offline, off-site backups . import.mdf.mallox
The file extension is characteristic of the Mallox ransomware (also known as TargetCompany). This ransomware targets SQL servers and encrypts databases and files, appending this specific string to the end of your original filenames.
April 29, 2026 Reference ID: IR-2026-MALLOX Status: Initial Investigation / Containment Phase 1. Executive Summary Likely a combination of AES-256 and RSA-2048
Drops a ransom note (typically RECOVERY_INFORMATION.txt ) in affected directories. 3. Scope of Impact [List Servers, e.g., SQL-PROD-01]
Typically exploits poorly secured MS SQL Servers via brute-force attacks or known vulnerabilities (e.g., CVE-2019-1068). Below is a drafted template you can use
Critical database files (.mdf, .ldf) and backups have been encrypted.