{"id":6309,"date":"2017-01-23T15:50:16","date_gmt":"2017-01-23T23:50:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-147\/"},"modified":"2017-01-23T15:50:16","modified_gmt":"2017-01-23T23:50:16","slug":"news-147","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-147\/","title":{"rendered":"No mas, Samas: What&#8217;s in this ransomware&#8217;s modus operandi?"},"content":{"rendered":"<div class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\">\n<p><span id=\"ms-rterangecursor-start\"><\/span>We&#8217;ve seen how ransomware managed to become a threat category that sends consumers and enterprise reeling when it hits them.\u00a0 It has become a high-commodity malware that is used as payload to spam email, macro malware, and exploit kit campaigns. It also digs onto victims&#8217; pockets in exchange for recovering files from their encrypted form.\u00a0 This is where <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Crowti\">Crowti<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:HTML\/Tescrypt\">Tescrypt<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Teerac.A\">Teerac<\/a>, and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky.A\">Locky<\/a> have been very active at.<\/p>\n<p>We&#8217;ve also observed some malware authors providing a different method of distribution in the black market called ransom-as-a-service (RaaS). \u00a0Malicious actors use RaaS to download the ransomware app builder and customize them accordingly.\u00a0 We&#8217;ve seen two threats, <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Sarento\">Sarento<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:JS\/Enrume.A\">Enrume<\/a>, built through this type of service and deployed to infect machines during the second half of 2015.<\/p>\n<p>&nbsp;<\/p>\n<h2>How Samas is different from other ransomware?<\/h2>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:MSIL\/Samas\">Ransom:MSIL\/Samas<\/a>, which surfaced in the past quarter, has a different way of getting into the system \u2013 it has a more targeted approach of getting installed.\u00a0 We have observed that this threat requires other tools or components to aid its deployment:<\/p>\n<\/p><\/div>\n<div class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\"><\/div>\n<p><a href=\"http:\/\/www.microsoft.com\/security\/portal\/blog-images\/b\/SamasFlowchart.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.microsoft.com\/security\/portal\/blog-images\/b\/SamasFlowchart.png\" alt=\"\" width=\"765\" height=\"390\" \/><\/a><\/p>\n<p class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\"><em>Figure 1:\u00a0 Ransom:MSIL\/Samas infection chain\u00a0<\/em><\/p>\n<h2>Samas ransomware&#8217;s tools of trade<\/h2>\n<p>&nbsp;<\/p>\n<p>The Samas infection chain diagram illustrates how <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:MSIL\/Samas\">Ransom:MSIL\/Samas<\/a> gets into the system.\u00a0\u00a0 It starts with a pen-testing\/attack server searching for potential vulnerable networks to exploit with the help of a publicly-available tool named reGeorg, which is used for tunnelling.<\/p>\n<p>Java-based vulnerabilities were also observed to have been utilized, such as\u00a0<a href=\"https:\/\/access.redhat.com\/solutions\/30744\">CVE-2010-0738<\/a> related to outdated JBOSS server applications.<\/p>\n<p>It can use other information-stealing malware (<a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Derusbi\">Derusbi<\/a>\/<a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=MSIL\/Bladabindi\">Bladabindi<\/a>) to gather login credentials as well.\u00a0 When it has done so, it will list the stolen credentials into a text file, for example, <strong>list.txt<\/strong>, and use this to deploy the malware and its components through a third party tool named <strong>psexec.exe<\/strong> through batch files that we detect as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:MSIL\/Samas\">Trojan:BAT\/Samas.B<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:MSIL\/Samas\">Trojan:BAT\/Samas.C<\/a>.<\/p>\n<p>One of the batch files that we detect as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:MSIL\/Samas\">Trojan:Bat\/Samas.B<\/a> also deletes the shadow files through the <strong>vssadmin.exe<\/strong> tool.<\/p>\n<p>Trojan:MSIL\/Samas.A usually takes\u00a0 the name of <strong>delfiletype.exe<\/strong> or <strong>sqlsrvtmg1.exe <\/strong>and does the following:<\/p>\n<ol>\n<li>Look for certain file extensions that are related to backup files in the system.<\/li>\n<li>Make sure they are not being locked up by other processes, otherwise, the trojan terminates such processes.<\/li>\n<li>Delete the backup files.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:MSIL\/Samas\">Ransom:MSIL\/Samas<\/a> demonstrates typical ransomware behavior\u00a0by encrypting files in the system using AES algorithm and renaming the encrypted file with extension <strong>encrypted.RSA<\/strong><em>. <\/em>It displays the ransom note when it has encrypted the files and will delete itself with the help of a binary in its resource named <strong>del.exe<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.microsoft.com\/security\/portal\/blog-images\/a\/HELP_DECRYPT_YOUR_FILES_3.png\" alt=\"\" width=\"907\" height=\"813\" \/><\/p>\n<p><em>Figure 2: Click to enlarge the image so you can see the Samas ransom message clearly.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"line-height: 107%;font-family: 'calibri',sans-serif;font-size: 11pt\"><span style=\"color: #000000\">So far, we&#8217;ve seen a new <\/span><\/span> <span style=\"line-height: 107%;font-family: 'calibri',sans-serif;font-size: 11pt\"><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:MSIL\/Samas\"><span style=\"color: #0000ff\">Ransom:MSIL\/Samas<\/span><\/a><\/span><span style=\"line-height: 107%;font-family: 'calibri',sans-serif;font-size: 11pt\"><span style=\"color: #000000\"> variant that shows signs of changing its code from the simple ASCII strings to more hex encoded characters possibly to better evade detection from security vendors.\u00a0 An example below shows that the files extension names to encrypt has been converted to hex strings:<\/span><\/span><\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/security\/portal\/blog-images\/b\/Ver1_samas.png\"><img decoding=\"async\" src=\"http:\/\/www.microsoft.com\/security\/portal\/blog-images\/b\/Ver1_samas.png\" alt=\"\" \/><\/a><br \/> <em>Figure 3:\u00a0 Version 1 &#8211; Ransom:MSIL\/Samas.A<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.microsoft.com\/security\/portal\/blog-images\/b\/Ver2_samas.png\" alt=\"\" \/><\/p>\n<p><em>Figure 4: Version 2 &#8211; Ransom:MSIL\/Samas.B<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>It has also changed from using WordPress as its decryption service site, <em>hxxps:\/\/lordsecure4u.wordpress.com<\/em>, and moved on to a more obscure Tor site to help anonymize itself, <em>hxxp:\/\/wzrw3hmj3pveaaqh.onion\/diana<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.microsoft.com\/security\/portal\/blog-images\/a\/Samas2.jpg\" alt=\"\" width=\"810\" height=\"455\" \/><\/p>\n<p><em>Figure 5: Majority of the Ransom:MSIL\/Samas infections are detected in North America, and a few instances in Europe<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\">Mitigation and prevention<\/h2>\n<p class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\"><span class=\"ms-rteThemeFontFace-1\">But yes, you can say no mas (translation from Spanish: no more) to Samas ransomware. <\/span><\/p>\n<p class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\"><span class=\"ms-rteThemeFontFace-1\">To help prevent yourself from falling prey to Samas or other ransomware attacks, use <\/span> <a href=\"http:\/\/www.microsoft.com\/security\/pc-security\/windows-defender.aspx\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">Windows Defender<\/span><\/a><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\"> for Windows 10<\/span><span class=\"ms-rteThemeFontFace-1\">\u00a0as your antimalware scanner, and <\/span> <a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-8\/join-maps-community\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">ensure that MAPS has been enabled<\/span><\/a><span class=\"ms-rteThemeFontFace-1\">.<\/span><\/p>\n<p class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\"><span class=\"ms-rteThemeFontFace-1\">Though ransomware and macro-based malware are on the rise, there&#8217;s still something that you or your administrators can proactively do: <\/span><\/p>\n<div class=\"ExternalClass6C4267B9DCD34CFAA76A967263F9CA54\">\n<ul>\n<li><span class=\"ms-rteThemeFontFace-1\">Ensure that a strong <\/span> <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/cc770394%28v=ws.10%29.aspx\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">password policy<\/span><\/a><span class=\"ms-rteThemeFontFace-1\"> is implemented throughout the enterprise.<\/span><\/li>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/02\/24\/locky-malware-lucky-to-avoid-it\/\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">Disable the loading of macros in Office programs<\/span><\/a>.<\/li>\n<li><a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/ee857085.aspx\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">Disable macro loading through the Group Policy settings<\/span><\/a>.<\/li>\n<li><span class=\"ms-rteThemeFontFace-1\">Keep your software <\/span> <a href=\"http:\/\/www.microsoft.com\/security\/portal\/definitions\/adl.aspx\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">up-to-date<\/span><\/a><span class=\"ms-rteThemeFontFace-1\"> to mitigate possible software exploits.<\/span>\n<ul>\n<li>See Redhat&#8217;s <a href=\"https:\/\/access.redhat.com\/solutions\/2205341\">resolution<\/a> for details.<\/li>\n<\/ul>\n<\/li>\n<li><span class=\"ms-rteThemeFontFace-1\">Protect derived domain credentials with <\/span> <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/mt483740%28v=vs.85%29.aspx\"><span class=\"ms-rteThemeFontFace-1\"><span lang=\"EN-US\">Credential Guard<\/span>\u00a0for Windows 10 Enterprise<\/span><\/a>.<\/li>\n<li><span class=\"ms-rteThemeFontFace-1\">Secure your code integrity with <\/span> <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/dn986865%28v=vs.85%29.aspx\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">Device Guard for Windows 10 Enterprise<\/span><\/a>.<\/li>\n<li><a title=\"Secure the lateral account movement in your enterprise\" href=\"http:\/\/download.microsoft.com\/download\/5\/1\/6\/516F59A7-91EE-4463-8612-C85FD3BEBDC7\/pop-securing-lateral-account-movement.pdf\" target=\"_blank\">Secure the lateral account movement in your\u00a0enterprise<\/a>.<\/li>\n<li><span class=\"ms-rteThemeFontFace-1\">Use two-factor authentication with <\/span> <a href=\"https:\/\/blogs.windows.com\/buildingapps\/2016\/01\/26\/convenient-two-factor-authentication-with-microsoft-passport-and-windows-hello\/\"><span class=\"ms-rteThemeFontFace-1\" lang=\"EN-US\">Microsoft Passport and Windows Hello<\/span><\/a><span class=\"ms-rteThemeFontFace-1\">.<\/span><\/li>\n<\/ul><\/div>\n<p>&nbsp;<\/p>\n<p><em>Marianne Mallen<\/em><\/p>\n<p><em>MMPC<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/03\/17\/no-mas-samas-whats-in-this-ransomwares-modus-operandi\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve seen how ransomware managed to become a threat category that sends consumers and enterprise reeling when it hits them.\u00a0 It has become a high-commodity malware that is used as payload to spam email, macro malware, and exploit kit campaigns. It also digs onto victims&#8217; pockets in exchange for recovering files from their encrypted form.\u00a0&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10807,10808,4500,10809,10810,10811,10812,10813,10814,10815,10806,10516,10816,10817,10818,10819,3765,10820,10821,10822,10823,10824,10825,10826,10827,10761,10762,10788,10787,10828],"class_list":["post-6309","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware","tag-credential-guard-for-windows-10-enterprise","tag-cybersecurity","tag-device-guard-for-windows-10-enterprise","tag-disable-macro","tag-disable-macro-in-office","tag-enterprise-software-security","tag-java-based-vulnerabilities","tag-jboss","tag-lateral-account-movement-security","tag-macro-based-malware","tag-microsoft","tag-microsoft-passport","tag-new-ransomware","tag-outdated-jboss","tag-ransommsilsamas","tag-ransomware","tag-ransomware-modus-operandi","tag-redhat","tag-samas-ransomware","tag-samas-ransomware-geographical-distribution","tag-samas-ransomware-geoloc_","tag-samas-ransomware-infection-chain","tag-secure-your-code-integrity","tag-securing-lateral-account-movement","tag-windows-10","tag-windows-defender","tag-windows-defender-blogs-for-home-users-and-small-businesses","tag-windows-defender-for-windows-10","tag-windows-hello"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6309"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6309\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6309"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}