{"id":12164,"date":"2018-04-30T10:10:14","date_gmt":"2018-04-30T18:10:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/04\/30\/news-5933\/"},"modified":"2018-04-30T10:10:14","modified_gmt":"2018-04-30T18:10:14","slug":"news-5933","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/30\/news-5933\/","title":{"rendered":"Spartacus ransomware: introduction to a strain of unsophisticated malware"},"content":{"rendered":"<p><strong>Credit to Author: Vasilios Hioureas| Date: Mon, 30 Apr 2018 17:40:09 +0000<\/strong><\/p>\n<p>Spartacus ransomware is a new sample that has been circulating in 2018. Written in C#, the original sample is obfuscated, which we will go over as we extract it to its readable state.<\/p>\n<p>Spartacus is a relatively straight-forward ransomware sample and uses some similar techniques and code to others we have seen in the past, such as ShiOne, Blackheart, and Satyr. However, there is no sure relationship between these samples and the actors. I mention it mainly to show that they share similar functionality and are basic in form.<\/p>\n<p>In the case of Satyr and Blackheart, the code is nearly identical, with Spartacus following almost the same code flow with some modifications. If I were to make an assumption, I would say they are either the same actor or the actors for each of them used the same code. But again, there are no facts to prove this as of now.<\/p>\n<p>In general, what we notice is that there is a string of these .NET ransomware popping up, all of them more or less the same or similar. It is just an easy form of ransomware that criminals are creating, as it obviously does not take much time or thought to make.<\/p>\n<p>There is nothing impressive about them, in fact just the opposite. I would say they are boring at best. So why are we writing about one of them? The analysis of Spartacus can essentially be a used as a base knowledge for anyone analyzing variants of these basic .NET ransomware that they may come across in the future.<\/p>\n<p>The two take aways from this article will be understanding the code in detail, and understanding how to get an obfuscated .NET sample into a readable state.<\/p>\n<h3>Spartacus<\/h3>\n<p>Before we begin, I want to mention one characteristic about Spartacus&#8217; encryption method. Spartacus starts by generating a unique key for encryption done with the <a href=\"https:\/\/blog.finjan.com\/rijndael-encryption-algorithm\/\">Rijndael<\/a> algorithm. (The <a href=\"https:\/\/blog.finjan.com\/rijndael-encryption-algorithm\/\">Rijndael<\/a> algorithm is a version of AES.)<\/p>\n<p>This key is saved and used to encrypt every single file, meaning that two identical files will have the same cipher-text. The AES key is encrypted with a RSA key embedded in the file. The cipher-text is encoded and shown to the user in the ransom note.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23468\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/screen-shot-2018-04-25-at-11-31-39-am\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-25-at-11.31.39-AM.png\" data-orig-size=\"1956,1214\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2018-04-25 at 11.31.39 AM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-25-at-11.31.39-AM-300x186.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-25-at-11.31.39-AM-600x372.png\" class=\"alignnone size-full wp-image-23468\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-25-at-11.31.39-AM.png\" alt=\"\" width=\"1956\" height=\"1214\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-25-at-11.31.39-AM.png 1956w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-25-at-11.31.39-AM-300x186.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-25-at-11.31.39-AM-600x372.png 600w\" sizes=\"auto, (max-width: 1956px) 100vw, 1956px\" \/><\/p>\n<p>The fact that the\u00a0RSA key is statically embedded in the ransomware implies that the private key exists on the server side of the ransomware author&#8217;s system. Thus, all AES keys from all victims of this particular strain can be decrypted using this one key if it is ever leaked.<\/p>\n<p>As this ransomware is not extremely complex, we will go straight to the deep technical analysis and code walkthrough.<\/p>\n<h3>Unpacking<\/h3>\n<p>When we first open the sample of Spartacus in ILSpy, we see this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23457\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/packed-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/packed.png\" data-orig-size=\"2650,1028\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"packed\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/packed-300x116.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/packed-600x233.png\" class=\"alignnone size-full wp-image-23457\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/packed.png\" alt=\"\" width=\"2650\" height=\"1028\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/packed.png 2650w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/packed-300x116.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/packed-600x233.png 600w\" sizes=\"auto, (max-width: 2650px) 100vw, 2650px\" \/><\/p>\n<p>The code of the functions is not visible and as you can see, everything is obfuscated. In these scenarios, I like to use a tool called <strong>de4dot<\/strong>. It will process the file and output a clean readable version. The -r flag is where you set the directory, which contains the obfuscated .NET sample.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23458\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/de4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/de4.png\" data-orig-size=\"1254,406\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"de4\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/de4-300x97.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/de4-600x194.png\" class=\"alignnone size-full wp-image-23458\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/de4.png\" alt=\"\" width=\"1254\" height=\"406\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/de4.png 1254w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/de4-300x97.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/de4-600x194.png 600w\" sizes=\"auto, (max-width: 1254px) 100vw, 1254px\" \/><\/p>\n<p>This gives us the clean version, which we will be using for our analysis going forward.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23459\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/clean-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/clean.png\" data-orig-size=\"2628,1326\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"clean\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/clean-300x151.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/clean-600x303.png\" class=\"alignnone size-full wp-image-23459\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/clean.png\" alt=\"\" width=\"2628\" height=\"1326\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/clean.png 2628w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/clean-300x151.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/clean-600x303.png 600w\" sizes=\"auto, (max-width: 2628px) 100vw, 2628px\" \/><\/p>\n<h3>Analysis<\/h3>\n<p>Let&#8217;s begin with the Main function shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-23387\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main-600x319.png\" alt=\"\" width=\"600\" height=\"319\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main-600x319.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main-300x160.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main.png 906w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>It starts by making sure there is only one instance of this malware running on the system. It does so by the <strong>CheckRunProgram<\/strong> function, which, among other things, creates a mutex and makes sure it is unique.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23388\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/screen-shot-2018-04-22-at-8-22-35-pm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-22-at-8.22.35-PM.png\" data-orig-size=\"1460,886\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2018-04-22 at 8.22.35 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-22-at-8.22.35-PM-300x182.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-22-at-8.22.35-PM-600x364.png\" class=\"alignnone size-full wp-image-23388\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-22-at-8.22.35-PM.png\" alt=\"\" width=\"1460\" height=\"886\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-22-at-8.22.35-PM.png 1460w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-22-at-8.22.35-PM-300x182.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Screen-Shot-2018-04-22-at-8.22.35-PM-600x364.png 600w\" sizes=\"auto, (max-width: 1460px) 100vw, 1460px\" \/><\/p>\n<p>After this check is complete, it executes\u00a0<strong>smethod_3<\/strong> in a thread.<\/p>\n<p>Before the smethod_3 begins, the constructor for this class gets automatically called now and sets up all the private members (variables), which include all special folders to search and encrypt. It also generates the AES key, which is unique to the victim, using the\u00a0<strong>KeyGenerator.GetUniqueKey(133)<\/strong> function. The special folders can be viewed below and will be referenced throughout the ransomware to begin folder traversing.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23389\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/c2_constructorspecialfoldderssetup\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/C2_constructorspecialFolddersSetup.png\" data-orig-size=\"1416,660\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"C2_constructorspecialFolddersSetup\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/C2_constructorspecialFolddersSetup-300x140.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/C2_constructorspecialFolddersSetup-600x280.png\" class=\"alignnone size-full wp-image-23389\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/C2_constructorspecialFolddersSetup.png\" alt=\"\" width=\"1416\" height=\"660\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/C2_constructorspecialFolddersSetup.png 1416w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/C2_constructorspecialFolddersSetup-300x140.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/C2_constructorspecialFolddersSetup-600x280.png 600w\" sizes=\"auto, (max-width: 1416px) 100vw, 1416px\" \/><\/p>\n<p>The keygen function as I mentioned is\u00a0<strong>GetUniqueKey(), <\/strong>the\u00a0details of which are below. Essentially, it just creates a series of cryptographically strong random numbers using the\u00a0<strong>RNGCryptoServiceProvider.GetNonZeroBytes\u00a0<\/strong>API function. It then uses that series of random numbers as indexes to the character set<br \/> <strong>array = &#8220;abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890&#8221;\u00a0<\/strong>to build a unique string of characters. This is the AES key, which will encrypt all files going forward.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23390\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/keygen-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/KeyGen.png\" data-orig-size=\"1874,882\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"KeyGen\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/KeyGen-300x141.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/KeyGen-600x282.png\" class=\"alignnone size-full wp-image-23390\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/KeyGen.png\" alt=\"\" width=\"1874\" height=\"882\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/KeyGen.png 1874w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/KeyGen-300x141.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/KeyGen-600x282.png 600w\" sizes=\"auto, (max-width: 1874px) 100vw, 1874px\" \/><\/p>\n<p>Now that the constructor of the class has been initiated, let&#8217;s take a look at the\u00a0<strong>smethod_3\u00a0<\/strong>function that was called.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23391\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/iteratespecialfolders\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateSpecialFolders.png\" data-orig-size=\"1210,852\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"IterateSpecialFolders\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateSpecialFolders-300x211.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateSpecialFolders-600x422.png\" class=\"alignnone size-full wp-image-23391\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateSpecialFolders.png\" alt=\"\" width=\"1210\" height=\"852\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateSpecialFolders.png 1210w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateSpecialFolders-300x211.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateSpecialFolders-600x422.png 600w\" sizes=\"auto, (max-width: 1210px) 100vw, 1210px\" \/><\/p>\n<p>This function iterates the list of special folders, which was generated in the constructor and begins its recursive traversal encrypting every file in the folders using the <strong>smethod_6<\/strong> function. One thing I will note here is that the encryption loop does not discriminate file types or special files. It will encrypt everything it comes across. Also, you can see <strong>smethod_1<\/strong> being called. This may be a leftover mistake of the programmer, as its output is not used anywhere in the program and is called later on when it&#8217;s time to display the encrypted key to the user.<\/p>\n<p>As I mentioned, the <strong>smethod_6<\/strong> function is the one doing all the encryption, but the <strong>smethod_5<\/strong>\u00a0function is the recursive function that will dig into each sub folder of whatever location it starts at, calling <strong>smethod_6<\/strong> on each iteration to encrypt the files in that sub folder.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23392\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/5_recursivedirectoryseasrcher\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/5_recursiveDirectorySeasrcher.png\" data-orig-size=\"1584,590\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"5_recursiveDirectorySeasrcher\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/5_recursiveDirectorySeasrcher-300x112.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/5_recursiveDirectorySeasrcher-600x223.png\" class=\"alignnone size-full wp-image-23392\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/5_recursiveDirectorySeasrcher.png\" alt=\"\" width=\"1584\" height=\"590\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/5_recursiveDirectorySeasrcher.png 1584w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/5_recursiveDirectorySeasrcher-300x112.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/5_recursiveDirectorySeasrcher-600x223.png 600w\" sizes=\"auto, (max-width: 1584px) 100vw, 1584px\" \/><\/p>\n<p>As you can see, it calls itself so that it will eventually cover every single sub folder. Then it calls\u00a0<strong>smethod_6<\/strong> to do the actual encryption, looping through every file in that folder.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23393\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/6_iteratedir\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/6_iterateDir.png\" data-orig-size=\"1496,676\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"6_iterateDir\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/6_iterateDir-300x136.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/6_iterateDir-600x271.png\" class=\"alignnone size-full wp-image-23393\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/6_iterateDir.png\" alt=\"\" width=\"1496\" height=\"676\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/6_iterateDir.png 1496w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/6_iterateDir-300x136.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/6_iterateDir-600x271.png 600w\" sizes=\"auto, (max-width: 1496px) 100vw, 1496px\" \/><\/p>\n<p>This method iterates all files in the current folder. The only stipulation is that the file is not already encrypted. This is the portion here, which simply makes sure the extension is not already <strong>.Spartacus:<\/strong><\/p>\n<pre>if (Path.GetExtension(text) == \".Spartacus\")  {   return;  }<\/pre>\n<p>If this check passes, it calls <strong>smethod_7<\/strong>, which does the file content rewriting with the encrypted version.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23394\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/encryptedbyteswritee\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptedBytesWritee.png\" data-orig-size=\"1358,407\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"encryptedBytesWritee\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptedBytesWritee-300x90.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptedBytesWritee-600x180.png\" class=\"alignnone size-full wp-image-23394\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptedBytesWritee.png\" alt=\"\" width=\"1358\" height=\"407\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptedBytesWritee.png 1358w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptedBytesWritee-300x90.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptedBytesWritee-600x180.png 600w\" sizes=\"auto, (max-width: 1358px) 100vw, 1358px\" \/><\/p>\n<p>The function calls <strong>smethod_0<\/strong>, which encrypts the original file data, and then the next two lines write the encrypted data into the file and rename it with the <strong>.Spartacus<\/strong> extension. A quick note: Another sign that every single file is encrypted with the same key is that this ransomware does not write the encrypted AES key into the file, which we see in other ransomware that perform unique file encryptions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23395\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/encryptionfunc\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptionFunc.png\" data-orig-size=\"1416,382\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"encryptionFunc\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptionFunc-300x81.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptionFunc-600x162.png\" class=\"alignnone size-full wp-image-23395\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptionFunc.png\" alt=\"\" width=\"1416\" height=\"382\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptionFunc.png 1416w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptionFunc-300x81.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/encryptionFunc-600x162.png 600w\" sizes=\"auto, (max-width: 1416px) 100vw, 1416px\" \/><\/p>\n<p>As you can see here, it uses the Rijndael method\u2014AES using ECB mode. The key that was generated in the constructor is hashed with MD5, and that is actually what is used as the key itself.<\/p>\n<p>Now we have gone through the whole process for file encryption on the main file system, through all the sub functions called inside of the parent function <strong>smethod_3.<\/strong><\/p>\n<p>Let&#8217;s go back to the main function now to the next line, which calls\u00a0<strong>smethod_4():<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23387\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/main-33\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main.png\" data-orig-size=\"906,482\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Main\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main-300x160.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main-600x319.png\" class=\"alignnone size-full wp-image-23387\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main.png\" alt=\"\" width=\"906\" height=\"482\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main.png 906w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main-300x160.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Main-600x319.png 600w\" sizes=\"auto, (max-width: 906px) 100vw, 906px\" \/><\/p>\n<p><strong>smethod_4<\/strong> basically performs exactly the same set of recursive function calls as we saw in <strong>smethod_3<\/strong>, however, rather than looping through special folders, it is now iterating over all logical drives that are attached to the system. So all external or mapped drives will be encrypted as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23396\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/iteratelogicaldrives\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateLogicalDrives.png\" data-orig-size=\"1214,376\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"IterateLogicalDrives\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateLogicalDrives-300x93.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateLogicalDrives-600x186.png\" class=\"alignnone size-full wp-image-23396\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateLogicalDrives.png\" alt=\"\" width=\"1214\" height=\"376\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateLogicalDrives.png 1214w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateLogicalDrives-300x93.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/IterateLogicalDrives-600x186.png 600w\" sizes=\"auto, (max-width: 1214px) 100vw, 1214px\" \/><\/p>\n<p>We do not need to go through all these details now as we have already covered their functionality, being that they are identical to the earlier function calls. The only thing I will mention is that <strong>smethod_6<\/strong> is called <strong>twice.<\/strong>\u00a0This is done most likely to speed up the encryption by having it run on two threads.<\/p>\n<p>Back to main: the next and final important function call is:<\/p>\n<pre>Application.Run(new Form1());<\/pre>\n<p>This will display the ransom note to the user and show the encrypted AES key in the ransom note.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23397\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/displayransonnote\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote.png\" data-orig-size=\"2294,1010\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"DisplayRansonNote\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote-300x132.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote-600x264.png\" class=\"alignnone size-full wp-image-23397\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote.png\" alt=\"\" width=\"2294\" height=\"1010\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote.png 2294w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote-600x264.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/DisplayRansonNote-195x85.png 195w\" sizes=\"auto, (max-width: 2294px) 100vw, 2294px\" \/><\/p>\n<p>It starts by calling <strong>smethod_1()<\/strong>. As I mentioned above, this simply takes the AES key, which was generated at the beginning and encrypts it using the hard-coded public RSA key.<\/p>\n<pre>public static string smethod_1()  {   return Convert.ToBase64String(Class1.smethod_2(\"&lt;RSAKeyValue&gt;&lt;Modulus&gt;xA4fTMirLDPi4rnQUX1GNvHC41PZUR\/fDIbHnNBtpY0w2Qc4H2HPaBsKepU33RPXN5EnwGqQ5lhFaNnLGnwYjo7w6OCkU+q0dRev14ndx44k1QACTEz4JmP9VGSia6SwHPbD2TdGJsqSulPkK7YHPGlvLKk4IYF59fUfhSPiWleURYiD50Ll2YxkGxwqEYVSrkrr7DMnNRId502NbxrLWlAVk\/XE2KLvi0g9B1q2Uu\/PVrUgcxX+4wu9815Ia8dSgYBmftxky427OUoeCC4jFQWjEJlUNE8rvQZO5kllCvPDREvHd42nXIBlULvZ8aiv4b7NabWH1zcd2buYHHyGLQ==&lt;\/Modulus&gt;&lt;Exponent&gt;AQAB&lt;\/Exponent&gt;&lt;\/RSAKeyValue&gt;\", Encoding.UTF8.GetBytes(Class2.smethod_0())));  }<\/pre>\n<p>The RSA key is hard coded and embedded into the ransomware, which means that the author has generated the private key in advance on his side.<\/p>\n<p>It then iterates all drives and writes the ransom note there. Finally, it opens the ransom note displaying the message and the RSA-encrypted AES key, which will be used by the victim in order to decrypt.<\/p>\n<p>After all of this, the final thing it does is call <strong>smethod_0<\/strong>,<strong>\u00a0<\/strong>which deletes shadow volumes in order to prevent the user from using as a Windows restore point.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23398\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/attachment\/shoadowviolue\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/shoadowViolue.png\" data-orig-size=\"1778,652\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"shoadowViolue\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/shoadowViolue-300x110.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/shoadowViolue-600x220.png\" class=\"alignnone size-full wp-image-23398\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/shoadowViolue.png\" alt=\"\" width=\"1778\" height=\"652\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/shoadowViolue.png 1778w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/shoadowViolue-300x110.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/shoadowViolue-600x220.png 600w\" sizes=\"auto, (max-width: 1778px) 100vw, 1778px\" \/><\/p>\n<p>This ransomware is purely offline in that there are no network communications back to the author or any C2 server. The ransomware author does not know who he has infected until they email him with their personal ID, which is the AES key. This also means that the decryption tool the author will send is likely embedded with the AES key, which unfortunately will be unique to the specific victim.<\/p>\n<p>There is nothing special or innovative about this sample, but that does not mean it is not dangerous. It will still do its job\u2014at the moment there is no decryptor for this. The only slight possibility to save yourself if you realize you are being hit with this malware is to perform a process memory dump, in which case there is a slight possibility of extracting the keys from memory.<\/p>\n<p>In general, it is always a good idea to perform a memory dump of any malware on your system before killing the process in the slight chance that some keys can be recovered.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/\">Spartacus ransomware: introduction to a strain of unsophisticated malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Vasilios Hioureas| Date: Mon, 30 Apr 2018 17:40:09 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/' title='Spartacus ransomware: introduction to a strain of unsophisticated malware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shutterstock_452117629.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Spartacus ransomware is a fairly new variant seen in 2018. We&#8217;ll walk you through the malware sample to analyze the code in detail, and help you learn how to get an obfuscated .NET sample into a readable state.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware-analysis\/\" rel=\"tag\">malware analysis<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spartacus\/\" rel=\"tag\">Spartacus<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spartacus-ransomware\/\" rel=\"tag\">Spartacus ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/' title='Spartacus ransomware: introduction to a strain of unsophisticated malware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/spartacus-introduction-unsophisticated-ransomware\/\">Spartacus ransomware: introduction to a strain of unsophisticated malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[3764,16466,3765,18268,18269,10494],"class_list":["post-12164","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-malware","tag-malware-analysis","tag-ransomware","tag-spartacus","tag-spartacus-ransomware","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12164"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12164\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12164"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}