{"id":22499,"date":"2023-07-18T15:21:14","date_gmt":"2023-07-18T23:21:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/07\/18\/news-16229\/"},"modified":"2023-07-18T15:21:14","modified_gmt":"2023-07-18T23:21:14","slug":"news-16229","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/18\/news-16229\/","title":{"rendered":"Sophos Discovers Ransomware Abusing &#8220;Sophos&#8221; Name"},"content":{"rendered":"<p><strong>Credit to Author: Andrew Brandt| Date: Tue, 18 Jul 2023 21:20:01 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Attackers will sometimes use the name of security companies in their malware. While performing a regular search on VirusTotal looking for interesting malware and new ransomware variants using our threat hunting rules this week, a Sophos X-Ops analyst discovered a novel ransomware executable that appears to use &#8220;Sophos&#8221; in the UI of the panel alerting that files have been encrypted, (shown below) and as the extension (&#8220;.sophos&#8221;) for encrypted files.<\/p>\n<p>The SophosLabs teams immediately investigated and began work on developing a targeted detection rule for Sophos endpoint security products, but a pre-existing behavioral rule (and Sophos CryptoGuard) blocked the ransomware from causing harm in tests. This targeted detection rule has been released as indicated in \u201cDetections,\u201d below.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/markedup-sophos-ransom-wallpaper-update.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92722\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/markedup-sophos-ransom-wallpaper-update.png\" alt=\"\" width=\"640\" height=\"350\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/markedup-sophos-ransom-wallpaper-update.png 1851w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/markedup-sophos-ransom-wallpaper-update.png?resize=300,164 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/markedup-sophos-ransom-wallpaper-update.png?resize=768,419 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/markedup-sophos-ransom-wallpaper-update.png?resize=1024,559 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/markedup-sophos-ransom-wallpaper-update.png?resize=1536,839 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>The ransomware executable itself, compiled using MinGW and containing linked Rust libraries, is unusually retro in terms of the functionality it appears to have. In most contemporary ransomware incidents, the threat actors who build the ransomware make a tool that is explicitly and exclusively made for the purpose of encrypting files, without including a lot of other functionality. Most ransomware we deal with today is a single-purpose executable that doesn\u2019t bring many, or any, additional capabilities.<\/p>\n<p>By all indications, the VirusTotal records on these files seem to indicate, and our analysis confirms, that one of the samples has the capability to do many things beyond encrypting files, which is unusual. The ransomware also seems to emphasize methods for the target to communicate with the attacker that most ransomware groups no longer use: email, and the Jabber instant messenger platform.<\/p>\n<p>In fact, <a href=\"https:\/\/www.virustotal.com\/gui\/file\/3da31ee0a6c6410b3c66aad41623d05aac61a4dbb85045eb89f5810ffdc93066\/behavior\">the capabilities of one of these files<\/a> falls closer to a general-purpose remote access trojan (RAT) with the capacity to encrypt files and generate these ransom notes, than to a contemporary ransomware executable. Those capabilities include hooking the keyboard driver for keystroke logging and profiling the system using WMI commands. Like many other ransomware, it excludes a list of directories that would either impede the system from booting or that contain unimportant files if they were encrypted. The ransomware also checks the language settings on the system and refuses to run if it is set to use the Russian language.<\/p>\n<p>The other known sample has fewer of these non-ransomware features. However, both of them connect over the internet to a command-and-control server address. The connection references an address on the Tor (.onion) dark web, but the ransomware samples we analyzed do not actually make a Tor connection.<\/p>\n<p>In addition, both samples contain a hardcoded IP address (one we did see the samples connect to). The address has been associated for more than a year with both Cobalt Strike command-and-control and automated attacks that attempt to infect internet-facing computers with cryptomining software.<\/p>\n<figure id=\"attachment_92726\" aria-describedby=\"caption-attachment-92726\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image3-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-92726 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image3-3.png\" alt=\"\" width=\"640\" height=\"599\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image3-3.png 763w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image3-3.png?resize=300,281 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-92726\" class=\"wp-caption-text\">Historical data strongly implicates the C2 address used by the ransomware in prior malicious activity<\/figcaption><\/figure>\n<h3>Console ransomware application<\/h3>\n<p>Both samples are intended to be executed in the Windows command line. When executed in the Windows Command Prompt application, the ransomware prompts the user (\u201cuser\u201d here means the criminal who is deploying the ransomware, not the owner of the computer) to enter a string of information that configures its behavior and the contents of the ransom note it eventually drops.<\/p>\n<p>The program prompts the person running it to enter a \u201cpassword encrypted (32 characters)\u201d followed by a \u201ctoken,\u201d an email address and a Jabber instant messaging account address. After the user enters that information, the program prompts the user to select an option to (1) encrypt all files on the hard drive, (2) encrypt a single drive letter, or (3) to quit the program.<\/p>\n<figure id=\"attachment_92727\" aria-describedby=\"caption-attachment-92727\" style=\"width: 844px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image4-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-92727\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image4-3.png\" alt=\"\" width=\"844\" height=\"447\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image4-3.png 981w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image4-3.png?resize=300,159 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image4-3.png?resize=768,407 768w\" sizes=\"auto, (max-width: 844px) 100vw, 844px\" \/><\/a><figcaption id=\"caption-attachment-92727\" class=\"wp-caption-text\">The ransomware console application prompts the criminal to add their contact information<\/figcaption><\/figure>\n<p>If the user chooses either the \u201csingle\u201d or \u201call\u201d options, when the ransomware completes the encrypting task, it renames the encrypted files using the \u201ctoken\u201d value in the renamed filename. The email address and Jabber address get added to the ransom note, which is an HTML Application (.hta file) dropped into any directory where encryption has taken place.<\/p>\n<p>The .hta file simply displays the ransom note, customized with the email address and other information the attacker provided at the start of the attack.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image6-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-92738\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image6-3.png\" alt=\"\" width=\"991\" height=\"415\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image6-3.png 813w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image6-3.png?resize=300,125 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image6-3.png?resize=768,321 768w\" sizes=\"auto, (max-width: 991px) 100vw, 991px\" \/><\/a><\/p>\n<p>The .hta contains the embedded email\/Jabber ID information.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92739\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png\" alt=\"\" width=\"640\" height=\"642\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png 741w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png?resize=150,150 150w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png?resize=300,300 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png?resize=32,32 32w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png?resize=50,50 50w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png?resize=64,64 64w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png?resize=96,96 96w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image5-3.png?resize=128,128 128w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>The ransomware appends a unique machine identifier, the email address entered during setup, and the suffix &#8220;.sophos&#8221; to every file it encrypts at the end of the process.<\/p>\n<figure id=\"attachment_92728\" aria-describedby=\"caption-attachment-92728\" style=\"width: 447px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image9-2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-92728\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image9-2.png\" alt=\"\" width=\"447\" height=\"370\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image9-2.png 347w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image9-2.png?resize=300,248 300w\" sizes=\"auto, (max-width: 447px) 100vw, 447px\" \/><\/a><figcaption id=\"caption-attachment-92728\" class=\"wp-caption-text\">Files renamed by the ransomware append the .sophos suffix<\/figcaption><\/figure>\n<p>If the encryption process is stopped before it is complete, the ransomware does not leave a ransom note behind or change the wallpaper image to the one it retrieves from the public image server.<\/p>\n<p>The ransomware also retrieves a graphic from a public image library website, and uses that to change the Windows desktop wallpaper to a screen which reads \u201cSophos.\u201d It\u2019s notable that this does not replicate Sophos logos, colors, or branding but instead presents a green padlock logo and instructions on how the target can find and use the ransom note to contact the attackers.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image10-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-92729\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image10-3.png\" alt=\"\" width=\"482\" height=\"247\" \/><\/a><\/p>\n<p>The ransomware&#8217;s file icon appears to match the padlock icon used in the wallpaper graphic shown at the top of the article.<\/p>\n<p>When run in the console, the ransomware outputs a long list of what appears to be debug logging, reporting the time it took to encrypt each file it finds, in milliseconds.<\/p>\n<figure id=\"attachment_92724\" aria-describedby=\"caption-attachment-92724\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image2-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-92724\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image2-3.png\" alt=\"\" width=\"640\" height=\"745\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image2-3.png 771w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image2-3.png?resize=258,300 258w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image2-3.png?resize=768,895 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-92724\" class=\"wp-caption-text\">The ransomware outputs debug logging in the console while running. It will report &#8220;SUCCESS&#8221; even when Sophos Intercept X prevents it from encrypting files.<\/figcaption><\/figure>\n<p>The testing of the ransomware also revealed that the ransomware attempts to validate the user&#8217;s permission to use the ransomware when it is run on a computer connected to the internet. In our tests, the ransomware also was capable of performing encryption tasks when it was run on a computer not connected to the internet.<\/p>\n<h3>Ransomware that checks its own validity<\/h3>\n<p>The ransomware executables&#8217; Properties sheets show that they are versions 0.0.8 and 0.0.9, respectively, of the program. Neither executable is signed, and both prompt for elevation via UAC when executed.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image7-3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-92730\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image7-3.png\" alt=\"\" width=\"860\" height=\"352\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image7-3.png 793w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image7-3.png?resize=300,123 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image7-3.png?resize=768,315 768w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/><\/a><\/p>\n<p>The initial behavior of the ransomware is for the user (again, &#8220;user&#8221; means criminal) to enter a &#8220;token.&#8221; The ransomware performs a minor bit of system profiling on the computer, retrieves the public IP address for the target&#8217;s network, and performs an HTTP POST request to the IP address <strong>179.43.154.137<\/strong> on port <strong>21119\/tcp<\/strong> that transmits the token, and profiling information about the computer. The session is not encrypted.<\/p>\n<figure id=\"attachment_92731\" aria-describedby=\"caption-attachment-92731\" style=\"width: 873px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image8-2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-92731\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image8-2.png\" alt=\"\" width=\"873\" height=\"352\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image8-2.png 797w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image8-2.png?resize=300,121 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/image8-2.png?resize=768,309 768w\" sizes=\"auto, (max-width: 873px) 100vw, 873px\" \/><\/a><figcaption id=\"caption-attachment-92731\" class=\"wp-caption-text\">HTTP POST session information during the ransomware &#8220;token&#8221; check<\/figcaption><\/figure>\n<p>If the &#8220;token&#8221; value is not acceptable to the server, the application outputs the error message &#8220;Your token is not valid!&#8221; in the console, and the application quits. However, if the ransomware is run on an offline computer disconnected from the internet, the ransomware displays &#8220;Local use of the program&#8221; and it proceeds to function, prompting the user to enter a 32-byte password, the contact information that gets embedded into the ransom note and appended to each filename, and it proceeds to begin encrypting.<\/p>\n<h2>Detection<\/h2>\n<p>Sophos Intercept X products will block the execution and malicious behaviors of this ransomware using the following signatures:<\/p>\n<ul>\n<li><strong>CryptoGuard<\/strong> &#8211; <span class=\"ui-provider fz b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Proactively blocks ransomware encryption attempts at runtime based on <strong>engine released May, 2017.<\/strong><\/span><\/li>\n<li><strong>Impact_6a<\/strong> \u2013 Runtime behavioral detection blocking the malicious activity at the Impact stage published October, 2020.<\/li>\n<li><strong>Troj\/Ransom-GXS<\/strong> \u2013 \u00a0Pre-execution anti-malware detection of the malicious file published July 18, 2023<\/li>\n<li><strong>Mal\/Generic-R<\/strong>\u00a0 &#8211; reputation detection preventing the execution of the malware, published July 17, 2023<\/li>\n<li><strong>Reputation-based detection for C2 IP<\/strong> \u2013 Blocks access to <strong>179.43.154.137,<\/strong> the C2 associated with the malware, published July 18, 2023<\/li>\n<\/ul>\n<p>These samples have only been observed in a public malware repository but have not been seen in use by an attacker. Sophos will continue to monitor for the use of this ransomware in the wild.<\/p>\n<p>Sophos has <a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000045508?language=en_US\">published a Knowledge Base article addressing this ransomware<\/a>. X-Ops has published <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/Troj-Ransom-GXS.csv\">IOCs relating to this malware<\/a> on the SophosLabs Github.<\/p>\n<h3>Acknowledgments<\/h3>\n<p>Sophos X-Ops would like to acknowledge the assistance of Yusuf Arsan Polat, Anand Ajjan, and Ronny Tijink for their assistance identifying and analyzing the samples. SophosLabs also thanks <a href=\"https:\/\/twitter.com\/malwrhunterteam\/status\/1681036041912811523\" target=\"_blank\" rel=\"noopener\">@malwrhunterteam<\/a> for alerting us about this.<\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/07\/18\/sophos-discovers-ransomware-abusing-sophos-name\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/padlock-screen.png\"\/><\/p>\n<p><strong>Credit to Author: Andrew Brandt| Date: Tue, 18 Jul 2023 21:20:01 +0000<\/strong><\/p>\n<p>Attackers will sometimes use the name of security companies in their malware. While performing a regular search on VirusTotal looking for interesting malware and new ransomware variants using our threat hunting rules this week, a Sophos X-Ops analyst discovered a novel ransomware executable that appears to use &#8220;Sophos&#8221; in the UI of the panel alerting [&#8230;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[29820,29821,129,11597,3765,11266,16771],"class_list":["post-22499","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-brand-abuse","tag-brandjacking","tag-featured","tag-raas","tag-ransomware","tag-sophos","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22499"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22499\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22499"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}