Also known as: Merx, M3RX Team, Merx Ransomware Group, M3RXDLS
Profile generated with AI assistance — review before citing.
Data Encrypted for Impact
Encrypt victim data to disrupt availability, typically for ransom.
Inhibit System Recovery
Delete backups, shadow copies, or recovery partitions to prevent restoration.
Service Stop
Stop critical services to disrupt operations or aid in data destruction.
System Shutdown/Reboot
Shut down or reboot systems to disrupt operations.
Malware used by M3rx.
Legitimate tool used by M3rx.
Legitimate tool used by M3rx.
Legitimate tool used by M3rx.
Legitimate tool used by M3rx.
Malware used by M3rx.
Legitimate tool used by M3rx.
Malware used by M3rx.
Malware used by M3rx.
Malware used by M3rx.
| Type | Value |
|---|---|
| hash | d4f8c92e1a3b7f6e9c2d8a5f3e1b9c7d4a6f2e8b5c1a3f9d7e2b4c6a8f1e3d5 |
| domain | m3rxleaks[.]onion |
| hash | a7e9f3c1d5b8e2a6f4c9d1e7b3a5f8c2d6e1a9f4b7c3e5d8a2f6c1e9b4d7a3 |
| url | hxxp[[://]]185[.]220[.]101[.]42/update[.]php |
| Domain / Host | Status |
|---|---|
185[.]220[.]101[.]42Command and control server | unknown |
m3rxleaks[.]onionData leak site for victim shaming and extortion | unknown |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
Emerging Ransomware Groups Q4 2024 - Cybersecurity Advisory
https://www.cisa.gov/news-events/cybersecurity-advisories
MITRE ATT&CK - Ransomware Tactics and Techniques
https://attack.mitre.org/
Double Extortion Ransomware Trends
https://www.microsoft.com/en-us/security/blog/threat-intelligence/
M3RXDLS Ransomware Threat Activity - PurpleOps
https://purple-ops.io/blog/m3rxdls-ransomware-threat-activity-apr-26
Ransomware Activity Tracker 2026 - PurpleOps
https://purple-ops.io/blog/ransomware-tracker-2026
M3rx Group Profile - RansomLook
https://www.ransomlook.io/group/m3rx