{"id":6834,"date":"2017-03-02T07:40:22","date_gmt":"2017-03-02T15:40:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/02\/news-625\/"},"modified":"2017-03-02T07:40:22","modified_gmt":"2017-03-02T15:40:22","slug":"news-625","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/02\/news-625\/","title":{"rendered":"Dot Ransomware: Yet another Commission-based Ransomware-as-a-Service"},"content":{"rendered":"<p><strong>Credit to Author: Rommel Joven| Date: Thu, 02 Mar 2017 06:54:42 -0800<\/strong><\/p>\n<div class=\"entry\">\n<p>Dot ransomware is a new <a href=\"http:\/\/blog.fortinet.com\/2017\/02\/16\/ransomware-as-a-service-rampant-in-the-underground-black-market\">Ransomware-as-a-service<\/a>&nbsp;(RaaS) that is openly available in hacking forums. And following the current trend in malware services, it uses web portals hosted in the TOR network for anonymity.<\/p>\n<h2>Commission-based Profit<\/h2>\n<p>While lurking in hacking forums, we came across a post for this new ransomware service. RaaS services are now switching from a one-time fee or subscription payment model to a commission based strategy. One advantage of this scheme is that the up front price for the ransomware is free, and any profits realized are just split 50\/50 between the author and affiliate. This is an easy, no pressure gateway for aspiring affiliates since nothing is invested in obtaining the ransomware.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 01 Dot Ransomware\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware001.png\" style=\"width: 577px; height: 482px;\" \/><\/p>\n<p align=\"center\">Figure 01 Dot Ransomware<\/p>\n<p>Visiting a Tor links directs potential affilaites to the Dot ransomware homepage. The site itself is relatively new. The ad shown in Figure 01, above, was posted on Feb 21 of this year, but the project was only launched a few days earlier, on Feb 19 (Figure 02.) Recent updates to the site show that this RaaS variant has continued to receive support and refinements from the author in order to improve the product.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware003.png\" style=\"width: 862px; height: 642px;\" \/><\/p>\n<p align=\"center\">Figure 02 Dot Ransomware Homepage<\/p>\n<p>To start, an affiliate needs to register using a Bitcoin Address.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 03 Login Page\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware005.png\" style=\"width: 550px; height: 514px;\" \/><\/p>\n<p align=\"center\">Figure 03 Login Page<\/p>\n<p>Once logged in, the malware builder can be downloaded, along with the core component, which is basically the payload itself with a default configuration.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 04 Download Builder and Core\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware007.png\" style=\"width: 921px; height: 709px;\" \/><\/p>\n<p align=\"center\">Figure 04 Download Builder and Core<\/p>\n<p>In order for affiliates to track the number and status of infections, a statistics page is made available. During our testing we found that the statistics only counts an infection as successful if the victim visits the decryption page. This has the advantages of eliminating automated infections and providing a more realistic return from real victims.<\/p>\n<p><img decoding=\"async\" alt=\"Figure 05 Statistics Page\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware009.png\" style=\"width: 932px; height: 367px;\" \/><\/p>\n<p align=\"center\">Figure 05 Statistics Page<\/p>\n<h2>Straight-forward Builder<\/h2>\n<p>The builder comes with a setup guide, although its usage is fairly straight-forward even without it.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 06 Content of Builder Zip file\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware011.png\" style=\"width: 572px; height: 81px;\" \/><\/p>\n<p align=\"center\">Figure 06 Content of Builder Zip file<\/p>\n<p>To guide complete newbies in the intricacies of RaaS, the setup guide includes recommendations on prices for particular countries and includes also a list of 380 suggested file target extensions.(Complete list of extensions is in the end of the article)<\/p>\n<p>Country Code|Price(Bitcoin)<\/p>\n<blockquote>\n<p>FR|0.15|FI|0.15|IE|0.15|IS|0.15|AU|0.15|BE|0.15|CA|0.15|AT|0.15|DK|0.15|SE|0.15|DE|0.15|NL|0.15|SA|0.2|US|0.2|HK|0.2|LU|0.2|CH|0.2|NO|0.2|AE|0.2|SG|0.2|KW|0.2|MO|0.2|QA|0.2<\/p>\n<\/blockquote>\n<p>As previously mentioned, configuring the payload is pretty straight-forward. The following features can be set in the builder.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 07 Ransomware Builder\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware013.png\" style=\"width: 675px; height: 341px;\" \/><\/p>\n<p align=\"center\">Figure 07 Ransomware Builder<\/p>\n<p>After setting up the necessary configurations and a generating a successful build, the DotRansomwareBuilder generates a Tracking ID that is unique for every build.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 08 Build Ransomware\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware015.png\" style=\"width: 675px; height: 340px;\" \/><\/p>\n<p align=\"center\">Figure 08 Build Ransomware<\/p>\n<h2>Configuration<\/h2>\n<p>The configuration is then encrypted and written in the overlay of the payload binary, as seen below.<\/p>\n<p><img decoding=\"async\" alt=\"Figure 09 Encrypted-Decrypted Configurations\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware019.png\" style=\"display:inline;width: 634px; height: 697px;\" \/><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/arrow.png\" style=\"margin-bottom:300px;margin-top:300px;display:inline;width: 68px; height: 62px;\" \/><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware017.png\" style=\"margin-bottom:250px;margin-top:300px;display:inline; width: 139px; height: 141px;\" \/><\/p>\n<p align=\"center\">Figure 09 Encrypted-Decrypted Configurations<\/p>\n<p>The decrypted configurations include the following data:<\/p>\n<h2>Author Comes First<\/h2>\n<p>After decryption of the configuration, it continues to decrypt the URL for the decryption and payment page <em>unlock26ozqwoyfv<\/em>. This URL is hard-coded by the author and cannot be configured by the user. To make sure that the URL has not been tampered with, it computes the SHA256 hash of the URL and compares it to a hard coded value. This is to ensure that the payments go through the author first. Only then will the user get paid, or at least hope to be paid.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 10 Hardcoded SHA256 value\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware021.png\" style=\"width: 594px; height: 69px;\" \/><\/p>\n<p align=\"center\">Figure 10 Hardcoded SHA256 value<\/p>\n<p>It does the same for the embedded RSA-4096 public key in the file. It computes the SHA256 hash and compares it to a hardcoded SHA256 value. This ensures that the private key on the C&amp;C side will be able to decrypt the <em>&ldquo;Signature&rdquo;<\/em> that was encrypted by the hard-coded public key.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 11 Decrypted RSA-4096 Key\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware023.png\" style=\"width: 594px; height: 678px;\" \/><\/p>\n<p align=\"center\">Figure 11 Decrypted RSA-4096 Key<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 12 Hard-coded SHA256 hash value\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware025.png\" style=\"width: 592px; height: 66px;\" \/><\/p>\n<p align=\"center\">Figure 12 Hard-coded SHA256 hash value<\/p>\n<p>If the computed SHA256 hash is not equal to the hard-coded value, dot ransomware will terminate.<\/p>\n<h3>Signature<\/h3>\n<p>Since there is no network traffic during run time to notify the C&amp;C, the <em>Signature<\/em> is important to differentiate between victims. The link to the decryption page of the ransomware is appended by the signature and is unique for every victim.<\/p>\n<p><img decoding=\"async\" alt=\"Figure 13 URL for Unlock26 website\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware027.png\" style=\"width: 1325px; height: 172px;\" \/><\/p>\n<p align=\"center\">Figure 13 URL for Unlock26 website<\/p>\n<p>The unique <em>Signature<\/em> of the victim consists of the following data:<\/p>\n<table align=\"center\" border=\"1\" cellpadding=\"0\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>Signature<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p><strong>Description<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>key{38 bytes }<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>Randomly generated and used as key for encryption<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>iv{8 bytes}<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>Randomly generated and used as Initialization Vector(iv)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>bitcoinAddress<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>Bitcoin address of affiliate<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>appID(TrackingID)<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>Unique for every build<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>country<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>Country of infected victim<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>price<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>Price set by the affiliate to decrypt files<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p><strong>partEncryption<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>True\/false &ndash; encrypt only first 4MB of file<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width:140px;\">\n<p>uniqueExtension<\/p>\n<p><strong>{3 char}<\/strong><\/p>\n<\/td>\n<td style=\"width:477px;\">\n<p>Randomly generated value appended to the encrypted filename<\/p>\n<p>&nbsp;i.e. <filename>.locked-{uniqueExtension}<\/filename><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>After accumulating all the needed data for the <em>Signature<\/em> it is encrypted by the embedded RSA-4096 public key. Some characters from the encrypted <em>Signature<\/em> are replaced from &ldquo;+ to @&rdquo;, &ldquo;\/ to &ndash;&ldquo; and &nbsp;&ldquo;= to !&rdquo; as added encoding. &nbsp;The final output will serve as the unique <em>Signature<\/em>.<\/p>\n<h1>Offline Encryption using Blowfish<\/h1>\n<p>Offline encryption is gaining popularity since it causes minimal network traffic noise, thus,making it less suspicious.<\/p>\n<p>The encryption used by Dot ransomware is Blowfish, a symmetric-key block cipher, and uses a randomly generated 38 bytes-length key alongside the 8 bytes initialization vector. An initialization vector (iv) prevents repetition in data encryption, making it more difficult to find a pattern in the encrypted file. Although the actual encryption for the file is a symmetric algorithm, the encryption key is encrypted using RSA-4096, which means that to be able to decrypt the files the private key is needed.&nbsp; &nbsp;<\/p>\n<p>Infected files are appended by .locked-{3 random char}.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 14 Encrypted files\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware029.png\" \/><\/p>\n<p align=\"center\">Figure 14 Encrypted files<\/p>\n<p>After encryption, the ransomware opens the ReadMe HTML file , which shows the sites the victim needs to visit to get instructions for unlocking the files.<\/p>\n<p>Taking a look at the unlock page, it is pretty straight-forward as only has one instruction, which is to pay. &nbsp;However, there&rsquo;s not much information on what happens after paying. Usually, a decryptor application is given to the victim.<\/p>\n<p align=\"center\"><img decoding=\"async\" alt=\"Figure 15 Unlock page\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware031.png\" style=\"width: 922px; height: 493px;\" \/><\/p>\n<p align=\"center\">Figure 15 Unlock page<\/p>\n<h2>Conclusion<\/h2>\n<p>The simplistic and straight-forward design of Dot ransomware enables just about anyone to conduct cybercrime. With all the support for bug fixes and developments, it&rsquo;s astonishing to think that these malware services have evolved using traditional business models. Moreover, it allows cyber criminals to easily start a RaaS business with the free additional safety of an online anonymity framework from Tor service and Bitcoin.<\/p>\n<p>Although we haven&rsquo;t seen this ransomware in the wild, with the advertisements being made accessible on hacking forums it&rsquo;s only a matter of time until people start taking the bait.<\/p>\n<p>-= FortiGuard Lion Team =-<\/p>\n<p><em>*Special thanks to my team mate Joie Salvio for additional insights <\/em><\/p>\n<p>&nbsp;<\/p>\n<p>IOCs<\/p>\n<p>Dot Ransomware will be proactively detected as W32\/Filecoder.DOT!tr<\/p>\n<p>SHA256<\/p>\n<p>core.exe &#8211; db43d7c41da0223ada39d4f9e883611e733652194c347c78efcc439fde6dde1c<\/p>\n<p>&nbsp;<\/p>\n<p>builder.zip &#8211; dd03307aa51cfb1c5a3c3fafc65729ad5b50a764354ef3919b7f9d0b4c6142a5<\/p>\n<p>&nbsp;<\/p>\n<p>DotRansomwareBuilder.exe &#8211; fb250ebe87db2c01cc13abed8bbdd66e0670071c0d51c56215ab86de6ed1c738<\/p>\n<p>&nbsp;<\/p>\n<p>Dropped Files:<\/p>\n<p>%Temp%ReadMe-{3char}.html<\/p>\n<p>{Infected directory}ReadMe-{3char}.html<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Setup Guide.txt<\/p>\n<p>Recommended attacked file extensions:<\/p>\n<p>001|1dc|3ds|3fr|7z|a3s|acb|acbl|accdb|act|ai|ai3|ai4|ai5|ai6|ai7|ai8|aia|aif|aiff|aip|ait|anim|apk|arch00|ari|art|arw|asc|ase|asef|asp|aspx|asset|avi|bar|bak|bay|bc6|bc7|bgeo|big|bik|bkf|bkp|blob|bmp|bsa|c|c4d|cap|cas|catpart|catproduct|cdr|cef|cer|cfr|cgm|cha|chr|cld|clx|cpp|cr2|crt|crw|cs|css|csv|cxx|d3dbsp|das|dayzprofile|dazip|db|db0|dbf|dbfv|dcr|dcs|der|desc|dib|dlc|dle|dlv|dlv3|dlv4|dmp|dng|doc|docm|docx|drf|dvi|dvr|dwf|dwg|dxf|dxg|eip|emf|emz|epf|epk|eps|eps2|eps3|epsf|epsp|erf|esm|fbx|ff|fff|fh10|fh11|fh7|fh8|fh9|fig|flt|flv|fmod|forge|fos|fpk|fsh|ft8|fxg|gdb|ge2|geo|gho|h|hip|hipnc|hkdb|hkx|hplg|hpp|hvpl|hxx|iam|ibank|icb|icxs|idea|iff|iiq|indd|ipt|iros|irs|itdb|itl|itm|iwd|iwi|j2k|java|jp2|jpe|jpeg|jpf|jpg|jpx|js|k25|kdb|kdc|kf|kys|layout|lbf|lex|litemod|lrf|ltx|lvl|m|m2|m2t|m2ts|m3u|m4a|m4v|ma|map|mat|mb|mcfi|mcfp|mcgame|mcmeta|mdb|mdbackup|mdc|mddata|mdf|mdl|mdlp|mef|mel|menu|mkv|mll|mlx|mn|model|mos|mp|mp4|mpqge|mrw|mrwref|mts|mu|mxf|nb|ncf|nef|nrw|ntl|obm|ocdc|odb|odc|odm|odp|ods|odt|omeg|orf|ott|p12|p7b|p7c|pak|pct|pcx|pdd|pdf|pef|pem|pfx|php|php4|php5|pic|picnc|pkpass|png|ppd|ppt|pptm|pptx|prj|prt|prtl|ps|psb|psd|psf|psid|psk|psq|pst|ptl|ptx|pwl|pxn|pxr|py|qdf|qic|r3d|raa|raf|rar|raw|rb|re4|rgss3a|rim|rofl|rtf|rtg|rvt|rw2|rwl|rwz|sav|sb|sbx|sc2save|shp|sid|sidd|sidn|sie|sis|skl|skp|sldasm|sldprt|slm|slx|slxp|snx|soft|sqlite|sqlite3|sr2|srf|srw|step|stl|stp|sum|svg|svgz|swatch|syncdb|t12|t13|tax|tex|tga|tif|tiff|tor|txt|unity3d|uof|uos|upk|vda|vdf|vfl|vfs0|vpk|vpp_pc|vst|vtf|w3x|wb2|wdx|wma|wmo|wmv|wallet|ycbcra|wotreplay|wpd|wps|x3f|xf|xl|xlk|xls|xlsb|xlsm|xlsx|xvc|xvz|xxx|zdct|zip|ztmp|py|rb|tar|gz|sdf|yuv|max|wav|dat<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/ftnt.net\/2iT7Mcp%C2%A0\"><i>Sign up<\/i><\/a><i>&nbsp;for weekly Fortinet FortiGuard Labs Threat Intelligence Briefs and stay on top of the newest emerging threats.<\/i><\/p>\n<\/div<br \/><a href=\"http:\/\/blog.fortinet.com\/2017\/03\/02\/dot-ransomware-yet-another-commission-based-ransomware-as-a-service\" target=\"bwo\" >https:\/\/blog.fortinet.com\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/Dot-Ransomware001.png\"\/><\/p>\n<p><strong>Credit to Author: Rommel Joven| Date: Thu, 02 Mar 2017 06:54:42 -0800<\/strong><\/p>\n<p>Dot ransomware is a new Ransomware-as-a-service(RaaS) that is openly available in hacking forums. And following the current trend in malware services, it uses web portals hosted in the TOR network for anonymity.    Commission-based Profit    While lurking in hacking forums, we came across a post for this new ransomware service. RaaS services are now switching from a one-time fee or subscription payment model to a commission based strategy. One advantage of this scheme is that the up front price for the ransomware is free, and any profits realized&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-6834","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6834"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6834\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6834"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}