• DMCA
  • Disclaimer
  • Terms and Conditions
  • Cookie Privacy Policy
  • Privacy Policy
  • Contact
  • Advertise
  • Home
  • Review
    Lincoln’s latest EV concept is a grand tourer land yacht with a sprinkle of 1920s nostalgia – TechCrunch

    Lincoln’s latest EV concept is a grand tourer land yacht with a sprinkle of 1920s nostalgia – TechCrunch

    For the first time ever, more people watched streaming TV than cable

    For the first time ever, more people watched streaming TV than cable

    If everyone bicycled like the Danes, we’d avoid a UK’s worth of emissions

    If everyone bicycled like the Danes, we’d avoid a UK’s worth of emissions

    Loathsome anti-vax group run by RFK Jr gets Meta permaban—finally

    Loathsome anti-vax group run by RFK Jr gets Meta permaban—finally

    FDA decision to allow over-the-counter hearing loss technology will be a catalyst for innovation – TechCrunch

    FDA decision to allow over-the-counter hearing loss technology will be a catalyst for innovation – TechCrunch

    Hands-on: Logitech’s tiny G705 wireless mouse is more versatile than it looks

    Hands-on: Logitech’s tiny G705 wireless mouse is more versatile than it looks

  • Gaming
    Naraka: Bladepoint’s Largest Update Yet Adds New Character And Massive Map

    Naraka: Bladepoint’s Largest Update Yet Adds New Character And Massive Map

    Metal Gear Solid VR Mod Is Everything Amazing About The Series

    Metal Gear Solid VR Mod Is Everything Amazing About The Series

    Random: The Stardew Valley Subreddit Keeps Making Very Convincing Fake Relationship Advice Posts

    Random: The Stardew Valley Subreddit Keeps Making Very Convincing Fake Relationship Advice Posts

    Available Today with PC Game Pass: Quake 4, Wolfenstein 3D, and More

    Available Today with PC Game Pass: Quake 4, Wolfenstein 3D, and More

    Get the lowdown on Fallout 76’s Expeditions before entering The Pitt – PlayStation.Blog

    Get the lowdown on Fallout 76’s Expeditions before entering The Pitt – PlayStation.Blog

    Classic game publisher Sunsoft says it’s back, will remake its retro games

    Classic game publisher Sunsoft says it’s back, will remake its retro games

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    P+S TECHNIK TECHNOVISION 1.5X AproXima

    P+S TECHNIK TECHNOVISION 1.5X AproXima

    Snap stops development of its Snapchat Pixy selfie drone

    Snap stops development of its Snapchat Pixy selfie drone

    Nothing phone (1) update brings tons of camera improvements and bug fixes

    Nothing phone (1) update brings tons of camera improvements and bug fixes

    Best deals today: Apple’s 2022 iPad Air, Mac mini, ASUS motherboards, and more

    Best deals today: Apple’s 2022 iPad Air, Mac mini, ASUS motherboards, and more

    The best Galaxy Watch 5 deals: how to preorder the new wearable

    The best Galaxy Watch 5 deals: how to preorder the new wearable

    Samsung’s back to school deals will get you a new Galaxy Z Fold 4 for just 0

    Samsung’s back to school deals will get you a new Galaxy Z Fold 4 for just $800

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    XCOM With Non-Canon Superheroes? Meet Capes

    XCOM With Non-Canon Superheroes? Meet Capes

    Huge Vulnerability on Realtek’s RTL819x SoC, Which Probably Includes You

    Huge Vulnerability on Realtek’s RTL819x SoC, Which Probably Includes You

    Fractal Focus 2 Mid-Tower Airflow Case Review

    Fractal Focus 2 Mid-Tower Airflow Case Review

    LIVA One A300 AMD Socket AM4 Mini PC Barebone Review

    LIVA One A300 AMD Socket AM4 Mini PC Barebone Review

    AMD Announces Ryzen 7000 Reveal Livestream for August 29th

    AMD Announces Ryzen 7000 Reveal Livestream for August 29th

    How To Get Me To Review A Keyboard? DROP A Lord Of The Rings Version

    How To Get Me To Review A Keyboard? DROP A Lord Of The Rings Version

  • Applications
    Apple Podcasts wants to let you know who has the most subscribers

    Apple Podcasts wants to let you know who has the most subscribers

    Apple releases Safari 15.6.1 with important security fix

    Apple releases Safari 15.6.1 with important security fix

    Get a first look at the final season of SEE

    Get a first look at the final season of SEE

    5 Best Apps for Video Editing

    5 Best Apps for Video Editing

    Avatar: Generations for iOS — Characters, gameplay, and everything you need to know

    Avatar: Generations for iOS — Characters, gameplay, and everything you need to know

    Splatoon 3 idols guide: Shiver, Big Man, and Frye

    Splatoon 3 idols guide: Shiver, Big Man, and Frye

  • Security
    Easing the Cyber-Skills Crisis With Staff Augmentation

    Easing the Cyber-Skills Crisis With Staff Augmentation

    China’s APT41 Embraces Baffling Approach for Dropping Cobalt Strike Payload

    China’s APT41 Embraces Baffling Approach for Dropping Cobalt Strike Payload

    North Korea’s Lazarus APT Targets Apple’s M1 Chip

    North Korea’s Lazarus APT Targets Apple’s M1 Chip

    5 Russia-Linked Groups Target Ukraine in Cyberwar

    5 Russia-Linked Groups Target Ukraine in Cyberwar

    Google Cloud blocks largest HTTPS DDoS attack ever

    Google Cloud blocks largest HTTPS DDoS attack ever

    Hackers Deploy Bumblebee Loader to Breach Target Networks

    Hackers Deploy Bumblebee Loader to Breach Target Networks

No Result
View All Result
  • Home
  • Review
    Lincoln’s latest EV concept is a grand tourer land yacht with a sprinkle of 1920s nostalgia – TechCrunch

    Lincoln’s latest EV concept is a grand tourer land yacht with a sprinkle of 1920s nostalgia – TechCrunch

    For the first time ever, more people watched streaming TV than cable

    For the first time ever, more people watched streaming TV than cable

    If everyone bicycled like the Danes, we’d avoid a UK’s worth of emissions

    If everyone bicycled like the Danes, we’d avoid a UK’s worth of emissions

    Loathsome anti-vax group run by RFK Jr gets Meta permaban—finally

    Loathsome anti-vax group run by RFK Jr gets Meta permaban—finally

    FDA decision to allow over-the-counter hearing loss technology will be a catalyst for innovation – TechCrunch

    FDA decision to allow over-the-counter hearing loss technology will be a catalyst for innovation – TechCrunch

    Hands-on: Logitech’s tiny G705 wireless mouse is more versatile than it looks

    Hands-on: Logitech’s tiny G705 wireless mouse is more versatile than it looks

  • Gaming
    Naraka: Bladepoint’s Largest Update Yet Adds New Character And Massive Map

    Naraka: Bladepoint’s Largest Update Yet Adds New Character And Massive Map

    Metal Gear Solid VR Mod Is Everything Amazing About The Series

    Metal Gear Solid VR Mod Is Everything Amazing About The Series

    Random: The Stardew Valley Subreddit Keeps Making Very Convincing Fake Relationship Advice Posts

    Random: The Stardew Valley Subreddit Keeps Making Very Convincing Fake Relationship Advice Posts

    Available Today with PC Game Pass: Quake 4, Wolfenstein 3D, and More

    Available Today with PC Game Pass: Quake 4, Wolfenstein 3D, and More

    Get the lowdown on Fallout 76’s Expeditions before entering The Pitt – PlayStation.Blog

    Get the lowdown on Fallout 76’s Expeditions before entering The Pitt – PlayStation.Blog

    Classic game publisher Sunsoft says it’s back, will remake its retro games

    Classic game publisher Sunsoft says it’s back, will remake its retro games

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    P+S TECHNIK TECHNOVISION 1.5X AproXima

    P+S TECHNIK TECHNOVISION 1.5X AproXima

    Snap stops development of its Snapchat Pixy selfie drone

    Snap stops development of its Snapchat Pixy selfie drone

    Nothing phone (1) update brings tons of camera improvements and bug fixes

    Nothing phone (1) update brings tons of camera improvements and bug fixes

    Best deals today: Apple’s 2022 iPad Air, Mac mini, ASUS motherboards, and more

    Best deals today: Apple’s 2022 iPad Air, Mac mini, ASUS motherboards, and more

    The best Galaxy Watch 5 deals: how to preorder the new wearable

    The best Galaxy Watch 5 deals: how to preorder the new wearable

    Samsung’s back to school deals will get you a new Galaxy Z Fold 4 for just 0

    Samsung’s back to school deals will get you a new Galaxy Z Fold 4 for just $800

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    XCOM With Non-Canon Superheroes? Meet Capes

    XCOM With Non-Canon Superheroes? Meet Capes

    Huge Vulnerability on Realtek’s RTL819x SoC, Which Probably Includes You

    Huge Vulnerability on Realtek’s RTL819x SoC, Which Probably Includes You

    Fractal Focus 2 Mid-Tower Airflow Case Review

    Fractal Focus 2 Mid-Tower Airflow Case Review

    LIVA One A300 AMD Socket AM4 Mini PC Barebone Review

    LIVA One A300 AMD Socket AM4 Mini PC Barebone Review

    AMD Announces Ryzen 7000 Reveal Livestream for August 29th

    AMD Announces Ryzen 7000 Reveal Livestream for August 29th

    How To Get Me To Review A Keyboard? DROP A Lord Of The Rings Version

    How To Get Me To Review A Keyboard? DROP A Lord Of The Rings Version

  • Applications
    Apple Podcasts wants to let you know who has the most subscribers

    Apple Podcasts wants to let you know who has the most subscribers

    Apple releases Safari 15.6.1 with important security fix

    Apple releases Safari 15.6.1 with important security fix

    Get a first look at the final season of SEE

    Get a first look at the final season of SEE

    5 Best Apps for Video Editing

    5 Best Apps for Video Editing

    Avatar: Generations for iOS — Characters, gameplay, and everything you need to know

    Avatar: Generations for iOS — Characters, gameplay, and everything you need to know

    Splatoon 3 idols guide: Shiver, Big Man, and Frye

    Splatoon 3 idols guide: Shiver, Big Man, and Frye

  • Security
    Easing the Cyber-Skills Crisis With Staff Augmentation

    Easing the Cyber-Skills Crisis With Staff Augmentation

    China’s APT41 Embraces Baffling Approach for Dropping Cobalt Strike Payload

    China’s APT41 Embraces Baffling Approach for Dropping Cobalt Strike Payload

    North Korea’s Lazarus APT Targets Apple’s M1 Chip

    North Korea’s Lazarus APT Targets Apple’s M1 Chip

    5 Russia-Linked Groups Target Ukraine in Cyberwar

    5 Russia-Linked Groups Target Ukraine in Cyberwar

    Google Cloud blocks largest HTTPS DDoS attack ever

    Google Cloud blocks largest HTTPS DDoS attack ever

    Hackers Deploy Bumblebee Loader to Breach Target Networks

    Hackers Deploy Bumblebee Loader to Breach Target Networks

No Result
View All Result
No Result
View All Result
Home Security

BlackCat ransomware | AT&T Alien Labs

RealHacker Staff by RealHacker Staff
February 25, 2022
BlackCat ransomware | AT&T Alien Labs
Share on FacebookShare on Twitter


This weblog was collectively written with Santiago Cortes. 

Government abstract

AT&T Alien Labs™ is scripting this report about just lately created ransomware malware dubbed BlackCat which was utilized in a January 2022 marketing campaign in opposition to two worldwide oil firms headquartered in Germany, Oiltanking and Mabanaft. The assault had little affect on finish clients, however it does serve to remind the cybersecurity neighborhood of the potential for risk actors to proceed assaults in opposition to important infrastructure globally.

Key takeaways:

  • The ransomware BlackCat is coded in Rust and was created in November 2021.
  • Following traits noticed final yr by Alien Labs, the ransomware targets a number of platforms (Home windows and Linux), and it makes use of extra code to contaminate VMware’s ESXi hypervisor.
  • Blackcat makes use of a “wall of disgrace” web site to each blackmail victims, show, and promote their newest campaigns publicly.
  • Campaigns stay lively, with 16 identified incidents in February 2022 as of the publishing of this report.

Background

The 2021 ransomware assault on US-based Colonial Pipeline, which impacted the gasoline provide on the East Coast of America for a number of days, raised consciousness of the truth that adversaries are effectively ready to launch future cyberattacks globally that might severely affect a rustic’s infrastructure. Now, with confrontations within the Ukrainian area taking over new ranges of urgency, there may be heightened expectation of future risk actor campaigns in opposition to the important infrastructure of western international locations. The campaigns may take the type of ransomware assaults or information wiper assaults, as these have been the extremely profitable lately, particularly when mixed with provide chain assaults.

Evaluation

German newspaper Handelsblatt said the oil firms Oiltanking and Mabanaft had been affected by a ransomware assault on January 29, 2022, that impacted one of many key oil suppliers within the space. The assaults allegedly brought on Shell to re-route their provides with a view to keep away from extreme impacts to the German gasoline provide. Even with these actions, it’s been said that 233 fuel stations throughout Germany have been affected by the incident, leading to these stations having to run some processes manually and solely taking money cost.

The malware behind these assaults is named BlackCat ransomware, aka ALPHV, as reported by the identical newspaper. The group operates with a ransomware-as-a-service (RaaS) enterprise mannequin, the place the ransomware authors are entitled to 10-20% of the ransom cost, whereas the remaining is stored by the associates deploying the payload. After a profitable assault, victims who refuse to pay the ransom have their particulars posted on darkish internet boards to make assaults public, rising their notoriety and shaming the affected organizations. In line with these blogs, at the very least 10 firms might have been impacted by these ransomware campaigns within the first two weeks of February.

For the reason that malware household operates as a RaaS, the preliminary entry vector is determined by the affiliate occasion deploying the payload and may range from one attacker to a different. Nevertheless, all of them seem to aim to exfiltrate victims’ information earlier than beginning the encryption course of, gaining extortion energy for subsequent requests.

The BlackCat gang first appeared in mid-November 2021, and its payload is written within the Rust programming language, which is taken into account to have an analogous efficiency to C/C++, however with higher reminiscence administration to keep away from reminiscence errors and concurrent programming. Moreover, it’s a cross platform language, permitting builders to focus on a number of working techniques with the identical code. For these causes, it has been voted because the “most liked programming language” in Stack Overflow since 2016.

Other than the creating benefits Rust gives, the attackers additionally make the most of a decrease detection ratio from static evaluation instruments, which aren’t normally tailored to all programming languages. For this identical motive, Go Language had change into extra well-liked amongst malware coders throughout final yr, as seen in different blogs launched by Alien Labs, together with:

Rust has been current in malware samples for a few years, however BlackCat is the primary professionally/commercialized distributed malware household utilizing it, and essentially the most affluent so far.

When executed, the malware gives a number of choices for customizing its execution. These choices have developed since its first model, proven in determine 2 which compares one of many first samples out there (reported by MalwareHunterTeain December 2021) to the newest samples/variations.

BlackCat sample

Determine 1. @malwrhunterteam screenshot of execution.

Most arguments are non-obligatory, however access-token is enforced to bypass the dynamic evaluation carried out by automated sandboxes. Nevertheless, any token offered bypasses the restriction and allows malware execution. This token, along with the host universally distinctive identifier (UUID), is later used to determine the sufferer in a Tor web site hosted by the attackers, which shows the worth for the recordsdata decryptor.

Amongst these choices, Alien Labs has noticed how a few of them are particular to VMware ESXi. This inclusion follows traits noticed in 2021 amongst different well-liked RaaS teams, like DarkSide or REvil,  who added Linux capabilities to incorporate VMware ESXi of their scope of potential targets. The hypervisor ESXi permits a number of digital machines (VM) to share the identical onerous drive storage. Nevertheless, this additionally allows attackers to encrypt the centralized digital onerous drives used to retailer information from throughout VMs, probably inflicting disruptions to firms.

The BlackCat malware has code similar to its predecessors. It first goals to cease any operating VMs in ESXi. By doing this, the attacker ensures no different VM is dealing with the recordsdata to be encrypted, avoiding corruption problems with the encrypted recordsdata. Moreover, any ESXi snapshots are eliminated to harden restoration from the assault.

Further preparation procedures are carried out by the BlackCat malware on Home windows techniques. For instance, it carries out some noisy actions that may be detected with Alien Labs correlation guidelines, as seen in Appendix A:

  • Delete Quantity Shadow Copies Companies to harden restoration from the assault. The command used is ‘vssadmin.exe Delete Shadows /all /quiet’.
  • Disables the restoration mode in BCDedit: ‘bcdedit.exe /set {default} recoveryenabled No’.
  • Maximize the worth of community requests the Server Service can take by altering the worth within the registry to 65535. This alteration eludes points accessing too many recordsdata directly through the encryption course of. The command used is: ‘reg add HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerParameters /v MaxMpxCt /d 65535 /t REG_DWORD /f ’.
  • If enabled, it makes an attempt to propagate with psexec into completely different techniques. The command runs from the %TEMP% folder, leveraging the credentials within the config file and the mother or father’s execution choices for propagation choices. ‘psexec.exe -accepteula {Goal} -u {consumer} -p {password} -s -d -f -c {payload}.exe {inherited execution flags}’.
  • Clears all of the occasion logs with wevtutil with the command: ‘cmd.exe /c for /F “tokens=*” %1 in (‘wevtutil.exe el’) DO wevtutil.exe cl “%1″’.

Along with the choices proven in determine 1, the newest samples have added three extra features that enhance the ransomware capabilities. These modifications preserve the road of labor already seen, with out together with any main modifications to the way in which the malware operates.

latest BlackCat sample

Determine 2. Newest pattern executed.

The present default configuration file appended with the newest noticed executable, consists of amongst others:

  • The general public key
  • The file extension to make use of for encrypted recordsdata, which corresponds to seven alphanumeric characters (0hzoagy for one of many newest samples)
  • A ransom observe (see determine 3) comprises the sufferer’s title a number of occasions in addition to the kind of recordsdata BlackCat has exfiltrated
  • An inventory of pre-obtained credentials from the sufferer which are for use throughout execution
  • An inventory of companies the sufferer ought to kill in line with the attacker, earlier than executing the encryption course of — normally companies modifying recordsdata that might corrupt recordsdata or backup companies that might change into counter-productive to the malicious execution. The record consists of: mepocs, memtas, veeam, svc$, backup, sql, vss, msexchange, sql$, mysql, mysql$, sophos, MSExchange, MSExchange$, WSBExchange, PDVFSService, BackupExecVSSProvider, BackupExecAgentAccelerator, BackupExecAgentBrowser, BackupExecDiveciMediaService, BackupExecJobEngine, BackupExecManagementService, BackupExecRPCService, GxBlr, GxVss, GxClMgrS, GxCVD, GxCIMgr, GXMMM, GxVssHWProv, GxFWD, SAPService, SAP, SAP$, SAPD$, SAPHostControl, SAPHostExec, QBCFMonitorService, QBDBMgrN, QBIDPService, AcronisAgent, VeeamNFSSvc, VeeamDeploymentService, VeeamTransportSvc, MVArmor, MVarmor64, VSNAPVSS, AcrSch2Svc.

BlackCat ransom note

Determine 3. Instance of ransom observe.

  • An inventory of processes to be killed earlier than executing the encryption course of, with an analogous goal because the companies record: agntsvc, dbeng50, dbsnmp, encsvc, excel, firefox, infopath, isqlplussvc, msaccess, mspub, mydesktopqos, mydesktopservice, notepad, ocautoupds, ocomm, ocssd, onenote, oracle, outlook, powerpnt, sqbcoreservice, sql, steam, synctime, tbirdconfig, thebat, thunderbird, visio, winword, wordpad, xfssvccon, *sql*, bedbh, vxmon, benetns, bengien, pvlsvr, beserver, raw_agent_svc, vsnapvss, CagService, QBIDPService, QBDBMgrN, QBCFMonitorService, SAP, TeamViewer_Service, TeamViewer, tv_w32, tv_x64, CVMountd, cvd, cvfwd, CVODS, saphostexec, saposcol, sapstartsrv, avagent, avscc, DellSystemDetect, EnterpriseClient, VeeamNFSSvc, VeeamTransportSvc, VeeamDeploymentSvc.
  • An inventory of excluded directories, filenames and file extensions to make sure the pc is operative after the encryption.
    • Directories: system quantity info, intel, $home windows.~ws, software information, $recycle.bin, mozilla, $home windows.~bt, public, msocache, home windows, default, all customers, tor browser, programdata, boot, config.msi, google, perflogs, appdata, home windows.outdated.
    • Filenames: desktop.ini, autorun.inf, ntldr, bootsect.bak, thumbs.db, boot.ini, ntuser.dat, iconcache.db, bootfont.bin, ntuser.ini, ntuser.dat.log.
    • File extensions: themepack, nls, diagpkg, msi, lnk, exe, cab, scr, bat, drv, rtp, msp, prf, msc, ico, key, ocx, diagcab, diagcfg, pdb, wpx, hlp, icns, rom, dll, msstyles, mod, ps1, ics, hta, bin, cmd, ani, 386, lock, cur, idx, sys, com, deskthemepack, shs ,ldf, theme, mpa, nomedia, spl, cpl, adv, icl, msu.

The ransom observe then factors to a Tor onion area with the sector ‘access-key=’ to determine the sufferer and present the worth to get better their recordsdata with the Decrypt App. Costs are indicated in Bitcoin and Monero, the newest has a reduction over Bitcoin.

Really useful actions

  1. Keep software program with the newest safety updates.
  2. Monitor and strongly, recurrently talk to workers to not open and report suspicious emails.
  3. Use a backup system to backup server recordsdata.
  4. Set up Antivirus and/or endpoint detection and response on all endpoints.
  5. Ensure that two-factor authentication is enabled in all companies.

Conclusion

Latest ransomware assaults carried out on German oil suppliers have been profitable, however they didn’t have a major affect on the nation’s infrastructure. Nevertheless, contemplating geo-political occasions in Japanese Europe, these assaults ought to function a robust reminder that organizations should stay on excessive alert in opposition to cyberattacks. They need to study current campaigns comparable to these run with BlackCat malware to coach  groups and preserve up-to-date detections for the newest risk actor techniques, strategies, and procedures (TTPs). Like most assaults and risk actor campaigns, BlackCat ransomware can obtain Preliminary Entry utilizing many alternative variations which are depending on the affiliate working the assault. Nevertheless, the payload will probably be very comparable for infections. Blue groups can use this technical info to enhance their readiness in opposition to the newest RaaS assaults.

Alien Labs will proceed to observe variations of BlackCat malware and can replace any actions on the Alien Labs Open Menace Change™, which is a free, world open risk intelligence neighborhood with greater than 200,000 customers publishing up to date risk intelligence each day. We ship this info within the type of “pulses” that may be shared publicly and privately. As well as, members of OTX can obtain thousands and thousands of indicators of compromise (IOCs), together with these related to BlackCat by way of integration with the platform.

Alien Labs is monitoring IOCs related to the geo-political battle in Japanese Europe, by way of tagged pulses that monitor incident and associated risk intelligence. To get essentially the most up to date info be a part of OTX and go to this URL to see the total record of pulses related to potential campaigns which may be associated to the Ukranian/Russian battle and risk actors concentrating on different international locations.   

Appendix A. Detection strategies

The next related detection strategies are in use by Alien Labs. They can be utilized by readers to tune or deploy detections in their very own environments or for aiding extra analysis.

USM Wherever Correlation Guidelines

Eliminated all snapshots utilizing vimcmd

Home windows Shadow Copies Deletion

Home windows PSExec Utilization

Home windows PSExec Service Utilization

Home windows SMB Server Most Concurrent Requests Set To Most Worth

Home windows Occasion Log Eliminated with wevtutil

Suspicious Bcdedit Utilization

 

YARA RULES

rule BlackCat : WindowsMalware {

   meta:

      creator = "AlienLabs"

      description = "Detects BlackCat payloads."

      SHA256 = "6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896"


    strings:


        $rust = "/rust/" ascii broad


        $a0 = "vssadmin.exe Delete Shadows /all /quietshadow" ascii

        $a1 = "bcdedit /set {default}bcdedit /set {default} recoveryenabled No" ascii broad

        $a2 = "CompaniesLanmanServerParameters /v MaxMpxCt /d 65535" ascii broad

        $a3 = ".onion/?access-key=${ACCESS_KEY}" ascii broad


        $b0 = "config_id" ascii

        $b1 = "public_key" ascii

        $b2 = "extension" ascii

        $b3 = "note_file_name" ascii

        $b4 = "enable_esxi_vm_kill" ascii

        $b5 = "enable_esxi_vm_snapshot_kill" ascii



    situation:

        uint16(0) == 0x5A4D and filesize < 5MB and $rust and a couple of of ($a*) and three of ($b*)

}
rule LinuxBlackCat : LinuxMalware {

    meta:

        creator = "AlienLabs"

        description = "Detects BlackCat payloads."

        SHA256 = "5121f08cf8614a65d7a86c2f462c0694c132e2877a7f54ab7fcefd7ee5235a42"

    strings:

        $rust = "/rust/" ascii broad

        $a0 = "esxcli vm course of kill --type=pressure --world-id=" ascii broad

        $a1 = ".onion/?access-key=${ACCESS_KEY}" ascii broad


        $b0 = "config_id" ascii

        $b1 = "public_key" ascii

        $b2 = "extension" ascii

        $b3 = "note_file_name" ascii

        $b4 = "enable_esxi_vm_kill" ascii

        $b5 = "enable_esxi_vm_snapshot_kill" ascii


    situation:

        uint32(0) == 0x464c457f and filesize < 5MB and $rust and all of ($a*) and three of ($b*)

}

Appendix B. Related indicators (IOCs)

The next technical indicators are related to the reported intelligence. An inventory of indicators can also be out there within the OTX Pulse. Please observe, the heart beat might embody different actions associated however out of the scope of the report.

TYPE

INDICATOR

DESCRIPTION

SHA256

f2b3f1ed693021b20f456a058b86b08abfc4876c7a3ae18aea6e95567fd55b2e

Home windows BlackCat Payload

SHA256

cefea76dfdbb48cfe1a3db2c8df34e898e29bec9b2c13e79ef40655c637833ae

Home windows BlackCat Payload

SHA256

7e363b5f1ba373782261713fa99e8bbc35ddda97e48799c4eb28f17989da8d8e

Home windows BlackCat Payload

SHA256

f837f1cd60e9941aa60f7be50a8f2aaaac380f560db8ee001408f35c1b7a97cb

Home windows BlackCat Payload

SHA256

731adcf2d7fb61a8335e23dbee2436249e5d5753977ec465754c6b699e9bf161

Home windows BlackCat Payload

SHA256

7b2449bb8be1b37a9d580c2592a67a759a3116fe640041d0f36dc93ca3db4487

Home windows BlackCat Payload

SHA256

38834b796ed025563774167716a477e9217d45e47def20facb027325f2a790d1

Home windows BlackCat Payload

SHA256

40f57275721bd74cc59c0c59c9f98c8e0d1742b7ae86a46e83e985cc4039c3a5

Home windows BlackCat Payload

SHA256

b588823eb5c65f36d067d496881d9c704d3ba57100c273656a56a43215f35442

Home windows BlackCat Payload

SHA256

f815f5d6c85bcbc1ec071dd39532a20f5ce910989552d980d1d4346f57b75f89

Home windows BlackCat Payload

SHA256

0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479

Home windows BlackCat Payload

SHA256

c5ad3534e1c939661b71f56144d19ff36e9ea365fdb47e4f8e2d267c39376486

Home windows BlackCat Payload

SHA256

7154fdb1ef9044da59fcfdbdd1ed9abc1a594cacb41a0aeddb5cd9fdaeea5ea8

Home windows BlackCat Payload

SHA256

658e07739ad0137bceb910a351ce3fe4913f6fcc3f63e6ff2eb726e45f29e582

Home windows BlackCat Payload

SHA256

5bdc0fb5cfbd42de726aacc40eddca034b5fa4afcc88ddfb40a3d9ae18672898

Home windows BlackCat Payload

SHA256

c8b3b67ea4d7625f8b37ba59eed5c9406b3ef04b7a19b97e5dd5dab1bd59f283

Home windows BlackCat Payload

SHA256

bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117

Home windows BlackCat Payload

SHA256

28d7e6fe31dc00f82cb032ba29aad6429837ba5efb83c2ce4d31d565896e1169

Home windows BlackCat Payload

SHA256

15b57c1b68cd6ce3c161042e0f3be9f32d78151fe95461eedc59a79fc222c7ed

Home windows BlackCat Payload

SHA256

4e18f9293a6a72d5d42dad179b532407f45663098f959ea552ae43dbb9725cbf

Home windows BlackCat Payload

SHA256

13828b390d5f58b002e808c2c4f02fdd920e236cc8015480fa33b6c1a9300e31

Home windows BlackCat Payload

SHA256

c3e5d4e62ae4eca2bfca22f8f3c8cbec12757f78107e91e85404611548e06e40

Home windows BlackCat Payload

SHA256

1af1ca666e48afc933e2eda0ae1d6e88ebd23d27c54fd1d882161fd8c70b678e

Home windows BlackCat Payload

SHA256

3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83

Home windows BlackCat Payload

SHA256

722f1c1527b2c788746fec4dd1af70b0c703644336909735f8f23f6ef265784b

Home windows BlackCat Payload

SHA256

d767524e1bbb8d50129485ffa667eb1d379c745c30d4588672636998c20f857f

Home windows BlackCat Payload

SHA256

aae77d41eba652683f3ae114fadec279d5759052d2d774f149f3055bf40c4c14

Home windows BlackCat Payload

SHA256

be8c5d07ab6e39db28c40db20a32f47a97b7ec9f26c9003f9101a154a5a98486

Home windows BlackCat Payload

SHA256

9f6876762614e407d0ee6005f165dd4bbd12cb21986abc4a3a5c7dc6271fcdc3

Home windows BlackCat Payload

SHA256

79802d6a6be8433720857d2b53b46f8011ec734a237aae1c3c1fea50ff683c13

Home windows BlackCat Payload

SHA256

2cf54942e8cf0ef6296deaa7975618dadff0c32535295d3f0d5f577552229ffc

Home windows BlackCat Payload

SHA256

bacedbb23254934b736a9daf6de52620c9250a49686d519ceaf0a8d25da0a97f

Home windows BlackCat Payload

SHA256

3c8ad2dae0b1bb536925b4e8d5a87e77c6134371eada2c7628358d6c6d3083dc

Home windows BlackCat Payload

SHA256

67d1f4077e929385cfd869bf279892bf10a2c8f0af4119e4bc15a2add9461fec

Home windows BlackCat Payload

SHA256

5a604a8f0e72f3bf7901b7b67f881031a402ab8072269c00233a554df548f54d

Home windows BlackCat Payload

SHA256

6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896

Home windows BlackCat Payload

SHA256

f8c08d00ff6e8c6adb1a93cd133b19302d0b651afd73ccb54e3b6ac6c60d99c6

Linux BlackCat Payload

SHA256

5121f08cf8614a65d7a86c2f462c0694c132e2877a7f54ab7fcefd7ee5235a42

Linux BlackCat Payload

SHA256

3a08e3bfec2db5dbece359ac9662e65361a8625a0122e68b56cd5ef3aedf8ce1

Linux BlackCat Payload

SHA256

f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083

Linux BlackCat Payload

SHA256

9802a1e8fb425ac3a7c0a7fca5a17cfcb7f3f5f0962deb29e3982f0bece95e26

Linux BlackCat Payload

 

Appendix C. Mapped to MITRE ATT&CK

The findings of this report are mapped to the next MITRE ATT&CK Matrix strategies:

  • TA0005: Protection Evasion
    • T1070: Indicator Removing on Host
      • T1070.001: Clear Home windows Occasion Logs
    • T1078: Legitimate Accounts
      • T1078.003: Native Accounts
    • T1562: Impair Defenses
      • T1562.001: Disable or Modify Instruments
  • TA0010: Exfiltration
    • T1048: Exfiltration Over Various Protocol
      • T1048.002: Exfiltration Over Uneven Encrypted Non-C2 Protocol
  • TA0040: Affect
    • T1486: Information Encrypted for Affect

Appendix D. Reporting context

The next record of sources was utilized by the report creator(s) through the assortment and evaluation course of related to this intelligence report.

  1. https://www.varonis.com/weblog/alphv-blackcat-ransomware
  2. https://unit42.paloaltonetworks.com/blackcat-ransomware

Alien Labs charges sources primarily based on the Intelligence supply and knowledge reliability score system to evaluate the reliability of the supply and the assessed stage of confidence we place on the knowledge distributed. The next chart comprises the vary of potentialities, and the choice utilized to this report..

Supply reliability A1

RATING

DESCRIPTION

A – Dependable

Little question in regards to the supply’s authenticity, trustworthiness, or competency. Historical past of full reliability.

B – Often Dependable

Minor doubts. Historical past of largely legitimate info.

C – Pretty Dependable

Doubts. Offered legitimate info prior to now.

D – Not Often Dependable

Important doubts. Offered legitimate info prior to now.

E – Unreliable

Lacks authenticity, trustworthiness, and competency. Historical past of invalid info.

F – Reliability Unknown

Inadequate info to guage reliability. Could or is probably not dependable.

 

Data reliability A2

RATING

DESCRIPTION

1 – Confirmed

Logical, according to different related info, confirmed by impartial sources.

2 – In all probability True

Logical, according to different related info, not confirmed.

3 – Presumably True

Fairly logical, agrees with some related info, not confirmed.

4 – Doubtfully True

Not logical however attainable, no different info on the topic, not confirmed.

5 – Inconceivable

Not logical, contradicted by different related info.

6 – Can’t be judged

The validity of the knowledge can’t be decided.

Suggestions

AT&T Alien Labs welcomes suggestions in regards to the reported intelligence and supply course of. Please contact the Alien Labs report creator or contact labs@alienvault.com.





Source link

Related

Tags: AlienATTBlackCatLabsRansomware
RealHacker Staff

RealHacker Staff

Recent Posts

  • P+S TECHNIK TECHNOVISION 1.5X AproXima
  • Snap stops development of its Snapchat Pixy selfie drone
  • Nothing phone (1) update brings tons of camera improvements and bug fixes
  • Lincoln’s latest EV concept is a grand tourer land yacht with a sprinkle of 1920s nostalgia – TechCrunch
  • Naraka: Bladepoint’s Largest Update Yet Adds New Character And Massive Map
  • Apple Podcasts wants to let you know who has the most subscribers
  • Best deals today: Apple’s 2022 iPad Air, Mac mini, ASUS motherboards, and more
  • Apple releases Safari 15.6.1 with important security fix

Follow Us

Categories

  • Applications
  • Audio
  • Camera
  • Computers
  • Gaming
  • Gear
  • Laptop
  • Metaverse
  • Microsoft
  • Photography
  • Review
  • Security
  • Smartphone
  • Uncategorized

Recent News

P+S TECHNIK TECHNOVISION 1.5X AproXima

P+S TECHNIK TECHNOVISION 1.5X AproXima

August 18, 2022
Snap stops development of its Snapchat Pixy selfie drone

Snap stops development of its Snapchat Pixy selfie drone

August 18, 2022
  • DMCA
  • Disclaimer
  • Terms and Conditions
  • Cookie Privacy Policy
  • Privacy Policy
  • Contact
  • Advertise

© 2019 - theme develop by real hacker news.

No Result
View All Result
  • Home
  • Review
  • Gaming
  • Gear
  • Computers
  • Applications
  • Security

© 2019 - theme develop by real hacker news.

error: Content is protected !!