Verticals Targeted: Not specified
Regions Targeted: None
Related Families: Petya, NotPetya, NotPetyaAgain, RedPetyaOpenSSL
Executive Summary
HybridPetya is a ransomware variant resembling Petya/NotPetya, capable of compromising UEFI-based systems and exploiting CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems. While not observed in active campaigns, its advanced capabilities warrant close monitoring by security teams.
Key Takeaways
- HybridPetya, discovered on VirusTotal in February 2025, mimics Petya/NotPetya by encrypting the Master File Table (MFT) but introduces UEFI compatibility.
- A variant exploits CVE-2024-7344, using a malicious cloak.dat file to bypass UEFI Secure Boot on systems without Microsoft’s January 2025 dbx update.
- Unlike NotPetya, HybridPetya allows decryption key recovery, functioning as traditional ransomware rather than a purely destructive tool.
- The malware includes a UEFI bootkit that installs a malicious EFI application to encrypt MFT on NTFS partitions, displaying fake CHKDSK messages to mask its activity.
What is HybridPetya?
In February 2025, ESET Research uncovered HybridPetya, a ransomware variant uploaded to another malware scanning service from Poland, echoing the destructive Petya/NotPetya malware of 2016–2017. Named for its shared traits with both predecessors, HybridPetya distinguishes itself with UEFI system compatibility and a novel UEFI Secure Boot bypass exploiting CVE-2024-7344. Although ESET telemetry shows no active deployment in the wild, its technical sophistication demands attention from malware analysts and security leaders.
HybridPetya targets the Master File Table (MFT) on NTFS-formatted partitions, encrypting critical metadata to render files inaccessible, a hallmark of Petya/NotPetya. Unlike NotPetya, which was designed for destruction with unrecoverable keys, HybridPetya’s key generation algorithm, inspired by the RedPetyaOpenSSL proof-of-concept, allows operators to reconstruct decryption keys from victims’ personal installation keys, aligning it closer to traditional ransomware.
A key innovation is its UEFI bootkit, which installs a malicious EFI application on the EFI System Partition. This bootkit supports both legacy and UEFI systems, checking an encryption flag in the `\EFI\Microsoft\Boot\config` file to determine its actions: encryption (flag 0), displaying a ransom note (flag 1), or decryption (flag 2). During encryption, it uses the Salsa20 algorithm with a 32-byte key and 8-byte nonce, targeting MFT on NTFS partitions identified by their signature. A fake CHKDSK message masks the encryption process, while a counter file tracks encrypted disk clusters.
The UEFI Secure Boot bypass variant leverages CVE-2024-7344 through a specially crafted `cloak.dat` file. This file, loaded by a vulnerable Microsoft-signed `reloader.efi`, bypasses integrity checks to execute the malicious bootkit on systems without Microsoft’s January 2025 dbx update. The archive included encrypted partition data and a backup of the legitimate bootloader, indicating prior encryption.
HybridPetya’s installer targets UEFI systems by detecting GPT partitions and the EFI System Partition. It drops configuration files, creates a verification array for key validation, and backs up the legitimate bootloader before triggering a system crash via the `NtRaiseHardError` API, forcing a reboot to execute the bootkit. The decryption process, initiated after a valid 32-character key is entered, reverses MFT encryption and restores legitimate bootloaders.
IOCs
PolySwarm has multiple samples of HybridPetya.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 can use the following CLI command to search for all HybridPetya samples in our portal:
$ polyswarm link list -f HybridPetya
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.