{"id":10775,"date":"2017-12-08T10:10:10","date_gmt":"2017-12-08T18:10:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/08\/news-4547\/"},"modified":"2017-12-08T10:10:10","modified_gmt":"2017-12-08T18:10:10","slug":"news-4547","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/08\/news-4547\/","title":{"rendered":"Napoleon: a new version of Blind ransomware"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 08 Dec 2017 17:00:15 +0000<\/strong><\/p>\n<p>The ransomware previously known as Blind has been spotted recently with a <i>.napoleon<\/i> extension and some additional changes. In this post, we&#8217;ll analyze the sample for its structure, behavior, and distribution method.<\/p>\n<h3>Analyzed samples<\/h3>\n<p><a href=\"https:\/\/www.virustotal.com\/#\/file\/a2275d2ddf227ac6f9778081e66e6fb84c76ed4754c799df35ba0b3d606b4dcc\/details\" target=\"_blank\" rel=\"noopener\">31126f48c7e8700a5d60c5222c8fd0c7<\/a> &#8211; Blind ransomware (the first variant), with <i>.blind<\/i> extension<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/#\/file\/951961520f980767e863bb3c881f860075d7e3cda5031c39c611ef0ec82c6e34\/details\" target=\"_blank\" rel=\"noopener\">9eb7b2140b21ddeddcbf4cdc9671dca1<\/a> &#8211; Variant with <i>.kill<\/i> extension<\/p>\n<p><strong><a href=\"https:\/\/www.virustotal.com\/#\/file\/070b60dcdfa5a00c33d019bfa068283c9b4662b8491a32323e17a956bd0bd831\/details\" target=\"_blank\" rel=\"noopener\">235b4fa8b8525f0a09e0c815dfc617d3<\/a> &#8211; <i>.napoleon<\/i>\u00a0(main focus of this analysis)<\/strong><\/p>\n<p><em>\/\/special thanks to <a href=\"https:\/\/twitter.com\/demonslay335\" target=\"_blank\" rel=\"noopener\">@demonslay335<\/a>\u00a0 for sharing the older samples<\/em><\/p>\n<h3>Distribution method<\/h3>\n<p>So far we are not 100 percent sure about the distribution method of this new variant. However, looking at the features of the malware and judging from information from the victims, we suspect that the attackers spread it manually by dropping and deploying on the hacked machines (probably via <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_Information_Services\" target=\"_blank\" rel=\"noopener\">IIS<\/a>). This method of distribution is not popular or efficient, however we&#8217;ve encountered similar cases in the past, such as DMALocker or <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/01\/lechiffre-a-manually-run-ransomware\/\" target=\"_blank\" rel=\"noopener\">LeChiffre ransomware<\/a>. Also, few months ago, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/copy-pasting-malware-dev-made-63-000-from-mining-monero-on-iis-servers\/\" target=\"_blank\" rel=\"noopener\">hacked IIS servers were used as a vector to plant Monero miners<\/a>. The common feature of samples dropped in this way is that they are not protected by any cryptor (because it&#8217;s not necessary for this distribution method).<\/p>\n<h3>Behavioral analysis<\/h3>\n<p>After the ransomware is deployed, it encrypts files one-by-one, adding its extension in the format <code>[email].napoleon<\/code>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20777 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/enc_files.png\" alt=\"\" width=\"427\" height=\"163\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/enc_files.png 427w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/enc_files-300x115.png 300w\" sizes=\"auto, (max-width: 427px) 100vw, 427px\" \/><\/p>\n<p>Looking at the content of the encrypted test files, we can see that the same plaintext gave different ciphertext. This always indicates that different key or initialization vectors were used for each file. (After examining the code, it turned out that the difference was in the initialization vector).<\/p>\n<p>Visualizing the encrypted content helps us guess the algorithm with which the files were encrypted. In this case, we see no visible patterns, so this leads us to suspect an algorithm with some method of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Block_cipher_mode_of_operation#Common_modes\" target=\"_blank\" rel=\"noopener\">chaining cipher blocks<\/a>. (The most commonly used is AES in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Block_cipher_mode_of_operation#Common_modes\" target=\"_blank\" rel=\"noopener\">CBC mode, or eventually in CFB mode<\/a>). Below, you can see the visualization made with the help of the <a href=\"https:\/\/github.com\/hasherezade\/crypto_utils\/blob\/master\/file2png.py\" target=\"_blank\" rel=\"noopener\">file2png script:<\/a>\u00a0On the left is a BMP file before encryption. And on the right, after encryption by Napoleon:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11700 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/03\/enc_square1.png\" alt=\"\" width=\"219\" height=\"219\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/03\/enc_square1.png 219w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/03\/enc_square1-150x150.png 150w\" sizes=\"auto, (max-width: 219px) 100vw, 219px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20825 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/enc_square1.bmp_.supp01@airmail.cc_.napoleon.png\" alt=\"\" width=\"219\" height=\"219\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/enc_square1.bmp_.supp01@airmail.cc_.napoleon.png 219w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/enc_square1.bmp_.supp01@airmail.cc_.napoleon-150x150.png 150w\" sizes=\"auto, (max-width: 219px) 100vw, 219px\" \/><\/p>\n<p>At the end of each file, we found a unique 384-long block of alphanumeric characters. They represent 192 bytes written in hexadecimal. Most probably this block is the encrypted initialization vector for the particular file):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20778 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypted_key.png\" alt=\"\" width=\"625\" height=\"557\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypted_key.png 625w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypted_key-300x267.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypted_key-600x535.png 600w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p>The ransom note is in HTA format and looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20776 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/ransom_note.png\" alt=\"\" width=\"800\" height=\"599\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/ransom_note.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/ransom_note-300x225.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/ransom_note-600x449.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>It also contains a hexadecimal block, which is probably the victim&#8217;s key, encrypted with the attackers&#8217; public key.<\/p>\n<p>The GUI of Napoleon looks simplified in comparison to the Blind ransomware. However, the building blocks are the same:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20788 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/blind_ransom_gui.png\" alt=\"\" width=\"1022\" height=\"759\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/blind_ransom_gui.png 1022w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/blind_ransom_gui-300x223.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/blind_ransom_gui-600x446.png 600w\" sizes=\"auto, (max-width: 1022px) 100vw, 1022px\" \/><\/p>\n<p>It is common among ransomware authors to prepare a tor-base website that allows automatic processing for payments and better organizes communication with the victim. In this case, the attackers decided to use just an email\u2014probably because they planned for the campaign to be small.<\/p>\n<p>Among the files created by the Napoleon ransomware, we will no longer find the cache file (netcache64.sys) that <a href=\"https:\/\/www.bleepingcomputer.com\/forums\/t\/660613\/blind-kill-ransomware-support-topic-how-decrypt-fileshta\/page-3\" target=\"_blank\" rel=\"noopener\">in the previous editions allowed to recover the key without paying the ransom<\/a>.<\/p>\n<p>Below is the cache file dropped by the Blind ransomware (the predecessor of Napoleon):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20787 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/netcache_blind.png\" alt=\"\" width=\"590\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/netcache_blind.png 590w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/netcache_blind-300x153.png 300w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/p>\n<h3>Inside the code<\/h3>\n<p>The malware is written in C++. It is not packed by any cryptor.<\/p>\n<p>The execution starts in the function WinMain:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20785 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_main.png\" alt=\"\" width=\"797\" height=\"595\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_main.png 797w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_main-300x224.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_main-600x448.png 600w\" sizes=\"auto, (max-width: 797px) 100vw, 797px\" \/><\/p>\n<p>The flow is pretty simple. First, the ransomware checks the privileges with which it runs. If it has sufficient privileges, it deletes shadow copies. Then, it closes processes related to databases\u2014Oracle and SQL Server\u2014so that they will not block access to the database files it wants to encrypt. Next, it goes through the disks and encrypts found files. At the end, it pops up the dropped ransom note in HTA format.<\/p>\n<p>Comparing the code of Napoleon with the code of Blind, we see that not just the extension of encrypted files has has changed, but also many functions inside have been refactored.<\/p>\n<p>Below is a fragment of the view from BinDiff: Napoleon vs Blind:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20789 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/bindiff.png\" alt=\"\" width=\"665\" height=\"684\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/bindiff.png 665w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/bindiff-292x300.png 292w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/bindiff-583x600.png 583w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/p>\n<h4>What is attacked?<\/h4>\n<p>First, the ransomware enumerates all the logical drives in the system and adds them into a target list. It attacks both fixed and remote drives (<a href=\"https:\/\/msdn.microsoft.com\/de-de\/library\/windows\/desktop\/aa364939(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener\"> type 3 -&gt;\u00a0<strong>DRIVE_FIXED<\/strong>\u00a0 and 4 -&gt; <strong>DRIVE_REMOTE<\/strong><\/a>):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20782 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/append_drives.png\" alt=\"\" width=\"613\" height=\"397\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/append_drives.png 613w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/append_drives-300x194.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/append_drives-600x389.png 600w\" sizes=\"auto, (max-width: 613px) 100vw, 613px\" \/><\/p>\n<p>This ransomware does not have any list of attacked extensions. It attacks all the files it can reach. It skips only the files that already have the extension indicating they are encrypted by Napoleon:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20784 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypting_and_adding_ext.png\" alt=\"\" width=\"642\" height=\"480\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypting_and_adding_ext.png 642w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypting_and_adding_ext-300x224.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypting_and_adding_ext-600x449.png 600w\" sizes=\"auto, (max-width: 642px) 100vw, 642px\" \/><\/p>\n<p>The email used in the extension is hardcoded in the ransomware&#8217;s code.<\/p>\n<h3>Encryption implementation<\/h3>\n<p>Just like the previous version, the cryptographic functions of Napoleon are implemented with the help of the statically-linked <a href=\"https:\/\/cryptopp.com\/\" target=\"_blank\" rel=\"noopener\">library Crypto++<\/a> (<a href=\"https:\/\/github.com\/weidai11\/cryptopp\" target=\"_blank\" rel=\"noopener\">source<\/a>).<\/p>\n<p>Referenced strings pointing to Crypto++:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20780 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/cryptopp_strings-1.png\" alt=\"\" width=\"712\" height=\"276\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/cryptopp_strings-1.png 712w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/cryptopp_strings-1-300x116.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/cryptopp_strings-1-600x233.png 600w\" sizes=\"auto, (max-width: 712px) 100vw, 712px\" \/><\/p>\n<p>Inside, we found a hardcoded blob\u2014the RSA public key of the attackers:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20781 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/hardcoded_blob.png\" alt=\"\" width=\"746\" height=\"217\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/hardcoded_blob.png 746w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/hardcoded_blob-300x87.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/hardcoded_blob-600x175.png 600w\" sizes=\"auto, (max-width: 746px) 100vw, 746px\" \/><\/p>\n<p>After conversion to a <a href=\"https:\/\/serverfault.com\/questions\/9708\/what-is-a-pem-file-and-how-does-it-differ-from-other-openssl-generated-key-file\" target=\"_blank\" rel=\"noopener\">standardized format, such as PEM<\/a>, we were able to read its parameters using openssl, confirming that it is a valid 2048 bit\u2013long RSA key:<\/p>\n<pre>Public-Key: (2048 bit)  Modulus:   00:96:c7:3f:aa:71:b1:e4:2c:2a:f3:22:0b:c2:88:   8c:87:63:b3:fa:31:97:9b:48:1b:64:2a:14:b9:85:   0a:2e:30:b2:22:c2:ee:fe:ce:de:db:b9:b7:68:3f:   12:a6:b3:e1:2b:db:ac:90:ea:3e:0a:07:25:3d:19:   f2:98:b3:b2:e3:1b:22:e6:0d:ad:d5:97:6f:57:cd:   77:6c:68:16:49:db:7d:c0:b8:03:e3:81:f5:62:ce:   22:ae:d9:71:f4:ed:28:f0:29:0b:e3:3c:ea:2d:d8:   13:fd:00:ff:da:4a:55:b8:70:c3:9f:ef:32:43:4b:   3f:82:fe:26:31:03:99:fd:b0:1a:2d:7b:f8:b6:65:   ab:d8:65:f3:c6:f3:e3:06:a9:58:5f:3e:35:0e:4c:   f0:9e:94:49:66:2e:9c:6c:51:27:62:c1:39:02:cc:   fb:32:4f:9a:92:f5:f9:99:96:5d:a7:65:5f:1c:fc:   0a:1e:8b:45:53:06:89:9f:50:11:d6:06:84:a2:f2:   5f:ab:e4:fb:cf:0d:09:64:d7:7c:99:f9:2a:b7:f5:   c6:e4:c1:23:24:4e:2b:9f:0b:98:c3:94:93:4f:ca:   c3:ff:ec:70:9d:df:78:37:56:0d:8b:c4:db:6d:b3:   73:ac:0a:cb:ac:28:b2:d4:54:61:3e:3c:7e:67:97:   f5:d9  Exponent: 17 (0x11)<\/pre>\n<p>This attacker&#8217;s public key is later used to encrypt the random key generated for the particular victim. The random key is the one used to encrypt files &#8211; after it is used and destroyed, it&#8217;s encrypted version is stored in the victim&#8217;s ID displayed in the ransom note. Only the attackers, having the private RSA key, are capable to recover it.<\/p>\n<p>The random AES key (32 bit) is generated by the function provided by Crypto++ library:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20803 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/gen_random_key.png\" alt=\"\" width=\"375\" height=\"187\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/gen_random_key.png 375w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/gen_random_key-300x150.png 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/><\/p>\n<p>It uses underneath the secure random generator: <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa379942(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener\">CryptGenRandom<\/a>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20829 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/gen_random.png\" alt=\"\" width=\"545\" height=\"149\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/gen_random.png 545w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/gen_random-300x82.png 300w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><\/p>\n<p>All the files are encrypted with the same key, however the initialization vector is different for each.<\/p>\n<p>Encrypting single file:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20828 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_file-1.png\" alt=\"\" width=\"630\" height=\"345\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_file-1.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_file-1-300x164.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypt_file-1-600x329.png 600w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/p>\n<p>Inside the function denoted as encrypt_file, the crypto is initialized with a new initialization vector:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20804 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/init_crypt_per_file.png\" alt=\"\" width=\"410\" height=\"145\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/init_crypt_per_file.png 410w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/init_crypt_per_file-300x106.png 300w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\" \/><\/p>\n<p>The fragment of code responsible for setting the IV:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20805 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/setting_iv.png\" alt=\"\" width=\"360\" height=\"164\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/setting_iv.png 360w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/setting_iv-300x137.png 300w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/p>\n<p>Setting initialization vector:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20830 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/init_vector.png\" alt=\"\" width=\"463\" height=\"121\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/init_vector.png 463w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/init_vector-300x78.png 300w\" sizes=\"auto, (max-width: 463px) 100vw, 463px\" \/><\/p>\n<p>Encrypting file content:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20808 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypting_bmp_sample.png\" alt=\"\" width=\"473\" height=\"284\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypting_bmp_sample.png 473w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/encrypting_bmp_sample-300x180.png 300w\" sizes=\"auto, (max-width: 473px) 100vw, 473px\" \/><\/p>\n<p>The same buffer after encryption:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20809 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/sample_after.png\" alt=\"\" width=\"509\" height=\"261\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/sample_after.png 509w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/sample_after-300x154.png 300w\" sizes=\"auto, (max-width: 509px) 100vw, 509px\" \/><\/p>\n<h3>Conclusion<\/h3>\n<p>Napoleon ransomware will probably not become a widespread threat. The authors prepared it for small campaigns\u2014lot of data, like email, are hardcoded. It does not come with any external configuration like Cerber that would allow for fast customization.<\/p>\n<p>So far, it seems that the authors fixed the previous bug in Blind of dropping the cache file. That means the ransomware is not decryptable without having the original key. All we can recommend is prevention.<\/p>\n<p>This ransomware family is detected by <a href=\"https:\/\/www.malwarebytes.com\/premium\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> as <strong><span class=\"individual_detection style-scope vt-detections\">Ransom.Blind<\/span><\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20791 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/BlindMB3.png\" alt=\"\" width=\"472\" height=\"240\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/BlindMB3.png 472w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/BlindMB3-300x153.png 300w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/p>\n<h3>Appendix<\/h3>\n<p>Read about how to decrypt the previous Blind variant <a href=\"https:\/\/www.bleepingcomputer.com\/forums\/t\/660613\/blind-kill-ransomware-support-topic-how-decrypt-fileshta\/page-3\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/napoleon-ransomware\/\">Napoleon: a new version of Blind ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/napoleon-ransomware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 08 Dec 2017 17:00:15 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/napoleon-ransomware\/' title='Napoleon: a new version of Blind ransomware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/shutterstock_397842676.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The ransomware previously known as Blind has been spotted recently with a .napoleon extension and a bug fix that means files can no longer be decrypted by victims. In this post, we&#8217;ll analyze the sample for its structure, behavior, and distribution method.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/blind-ransomware\/\" rel=\"tag\">Blind ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/decryption\/\" rel=\"tag\">decryption<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/lechiffre-ransomware\/\" rel=\"tag\">LeChiffre ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/napoleon-ransomware\/\" rel=\"tag\">Napoleon ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/napoleon-ransomware\/' title='Napoleon: a new version of Blind ransomware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/napoleon-ransomware\/\">Napoleon: a new version of Blind ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16910,12916,16911,3764,16912,3765,10494],"class_list":["post-10775","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-blind-ransomware","tag-decryption","tag-lechiffre-ransomware","tag-malware","tag-napoleon-ransomware","tag-ransomware","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10775"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10775\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10775"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}