{"id":6446,"date":"2017-01-31T09:10:04","date_gmt":"2017-01-31T17:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/31\/news-283\/"},"modified":"2017-01-31T09:10:04","modified_gmt":"2017-01-31T17:10:04","slug":"news-283","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/01\/31\/news-283\/","title":{"rendered":"Locky Bart ransomware and backend server analysis"},"content":{"rendered":"<p>In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware campaigns running called \u201cLocky\u201d and \u201cLocky v2\u201d. After some users reported being infected with Locky Bart, we investigated it to find the differences as to gain greater knowledge and understanding of this new version.<\/p>\n<p>The Locky Bart ransomware has new features that are different from its\u00a0predecessors. It can encrypt a machine without any connection to the Internet. It also has a much faster encryption mechanism.<\/p>\n<p>Our research would also indicate that the backend infrastructure of Locky Bart might be maintained by a different threat actor than the original versions. While the internals of the malicious binary share a great number of similarities, there were some notable differences.<\/p>\n<p>These included: <em>Comments in the code of the application, but more notably the kind of software used in the backend server.<\/em><\/p>\n<p>This did not come as a surprise, as cyber-criminals are known to share, rent, sell, and even steal malicious code from one another.<\/p>\n<h3><strong>Analysis of Locky Bart\u2019s binary<\/strong><\/h3>\n<p>In their previous incarnations, Locky and Locky v2 used a simpler encryption process. They enumerated the files targeted for encryption, placed each in a password protected ZIP archive, and repeated this process until all the files were encrypted. The creators did not use the AES ZIP protection, but an older algorithm, and because of this, researchers were able to\u00a0make a decrypting application.<\/p>\n<p>Locky Bart performs a fairly straight forward set of actions to encrypt the victim\u2019s files. They are as follows:<\/p>\n<ul>\n<li>Wipe System Restore Points with VSSadmin.<\/li>\n<li>Generate a seed to create a key to encrypt user\u2019s files.<\/li>\n<li>Enumerate the files it wants to encrypt, skipping certain folders to speed it up.<\/li>\n<li>Encrypt the enumerated files with the generated key.<\/li>\n<li>Encrypt the key used to encrypt the files with a master Kkey, which now becomes the victim\u2019s \u201cUID\u201d used to identify them.<\/li>\n<li>Create a ransom note on the desktop with a link to a payment page and their \u201cUID\u201d.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16209\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function1.png\" alt=\"\" width=\"1475\" height=\"658\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function1.png 1475w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function1-300x134.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function1-600x268.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function1-604x270.png 604w\" sizes=\"auto, (max-width: 1475px) 100vw, 1475px\" \/><\/p>\n<p style=\"text-align: center\"><em>The function used to generate a seed, which is used to create a key to encrypt the files with. It uses variables like system time, process ID, thread ID, Process Alive Time, and CPU ticks to generate a random number.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16210\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function2.png\" alt=\"\" width=\"749\" height=\"1469\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function2.png 749w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function2-153x300.png 153w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function2-306x600.png 306w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p style=\"text-align: center\"><em>The function used to enumerate and encrypt the files.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16214\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function3.png\" alt=\"\" width=\"340\" height=\"325\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function3.png 340w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function3-300x287.png 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/p>\n<p style=\"text-align: center\"><em>Bart will skip any folders with these strings in them.<\/em><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16215\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function4.png\" alt=\"\" width=\"1086\" height=\"321\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function4.png 1086w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function4-300x89.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function4-600x177.png 600w\" sizes=\"auto, (max-width: 1086px) 100vw, 1086px\" \/><\/p>\n<p style=\"text-align: center\"><em>The file-types that Bart targets to encrypt.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16216\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/paymentserver.png\" alt=\"\" width=\"1363\" height=\"399\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/paymentserver.png 1363w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/paymentserver-300x88.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/paymentserver-600x176.png 600w\" sizes=\"auto, (max-width: 1363px) 100vw, 1363px\" \/><\/p>\n<p style=\"text-align: center\"><em>The string that Bart uses to make a Ransom Note. The \u201ckhh5cmzh5q7yp7th.onion\u201d is the payment server, and <\/em><em>the \u201cAnOh\/Cz9MMLiZMS9k\/8huVvEbF6cg1TklaAQBLADaGiV\u201d is a sample UID that would be sent with the URL to the server for the victim to make a payment. Remember that the UID is only an encrypted version of the key that can be used to decrypt a victim\u2019s files.<\/em><\/p>\n<p style=\"text-align: left\">How the creators of Bart Locky acquire the key is what differentiates this version from its predecessors. When the victim of the ransomware visits the URL to make their payment for the ransom, they are unknowingly sending their decryption key to the criminals.<\/p>\n<p>Let\u2019s break down the process in a more granular method, to better understand it.<\/p>\n<ul>\n<li>Bart Locky gathers information on the victim\u2019s machine to create an encryption key.<\/li>\n<\/ul>\n<ul>\n<li>Bart Locky encrypts the user\u2019s files using the seeded key created in the previous step.<\/li>\n<\/ul>\n<ul>\n<li>Bart Locky then encrypts the key that was used for the original encryption with a one way encryption mechanism, using the public key of a public \/ private key pair method. The private key for this second encryption resides on the malicious server and is never accessible to the victim.<\/li>\n<\/ul>\n<ul>\n<li>Bart Locky then generates a URL on the victim\u2019s machine. It contains the link to a TOR cloaked .onion address where the malicious backend website is hosted. This URL has a user ID within it. This UID is the original decryption key, in encrypted form.<\/li>\n<\/ul>\n<ul>\n<li>The victims visits the .onion site and the malicious server harvests the encrypted UID.<\/li>\n<\/ul>\n<p>This UID is useless to the victim though, because they do not have the private key to decrypt their files. However, the ransomware creator\u2019s server does, meaning his server can not only use the UID to identify the victim, but also decipher the UID into their victim\u2019s key upon payment of the ransom.<\/p>\n<p>In the end, only the ransomware creators can decrypt the user\u2019s files, and because of this feature, there is no need to access the malicious server to encrypt them.<\/p>\n<h3><strong>Locky Bart Software Protection\u00a0technique<\/strong><\/h3>\n<p>The Bart Locky binary also uses a software protection\u00a0technique. This technique is known as code virtualization and is added to Bart Locky binary by using a program called \u201c<a href=\"https:\/\/github.com\/xiaoweime\/WProtect\" target=\"_blank\">WPProtect<\/a>\u201d.<\/p>\n<p>This makes reversing the binary significantly more difficult to disassemble and complicates stepping through the code, a technique used to understand what it does. Legitimate uses of this type of software are most typically seen in anti-piracy mechanisms. An example of a commercial version of this type of software would be <a href=\"http:\/\/www.oreans.com\/themida.php\" target=\"_blank\">Themida<\/a>. The author of Bart Locky probably chose this particular anti-tampering mechanism as it is free, open source, and provides many features. This adoption of software protection techniques is a troubling development. These applications, including WPProtect, make reversing and analysis significantly more challenging.<\/p>\n<h3><strong>The Locky Bart server<\/strong><\/h3>\n<p>The second half of Locky Bart is the server and backend. This server is used to provide the victims with a payment mechanism to pay the ransom.<\/p>\n<ul>\n<li>Receive the bitcoins used as a payment method.<\/li>\n<li>Transfer the bitcoins to other wallets.<\/li>\n<li>Generate a decryption EXE for the victims.<\/li>\n<li>Provide the victims with the decryption EXE to the victims.<\/li>\n<li>Accrue additional information on the victims.<\/li>\n<\/ul>\n<p>The Bart Locky backend runs on a framework called <a href=\"http:\/\/www.yiiframework.com\/\" target=\"_blank\">yii<\/a>.\u00a0Yii is a high-performance PHP framework best for developing Web 2.0 applications.<\/p>\n<p>This framework contains a wealth of information on the inner workings of Bart Locky.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-16237 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/yii_debug-600x401.png\" alt=\"\" width=\"600\" height=\"401\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/yii_debug-600x401.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/yii_debug-300x200.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/yii_debug.png 1008w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p style=\"text-align: center\"><em>TheYii debug panel that contained\u00a0extensive information about the configuration server.\u00a0<\/em><\/p>\n<p style=\"text-align: left\">Access to this control panel revealed:<\/p>\n<ul>\n<li>Every configuration setting for all the software running on the server such as PHP, Bootstrap, Javascript, Apache (if used), Nginx (If used), ZIP, and more.<\/li>\n<li>Every request that was made to the server including their request information, header information, body, timestamp, and where they originated.<\/li>\n<li>Logs that showed every error, trace, and debug item.<\/li>\n<li>All the automated email functions.<\/li>\n<li>MYSQL Monitoring that showed every statement made and its return.<\/li>\n<\/ul>\n<p>Locky Bart stores information in a MYSQL database. The credentials to the MYSQL server reside in a \u201cConfig\u201d PHP file in the \u201cCommon\u201d folder of the site. An example path looks like the following:<em> \/srv\/common\/config\/main-local.php<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16217\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/MYSQLconfig.png\" alt=\"\" width=\"927\" height=\"476\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/MYSQLconfig.png 927w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/MYSQLconfig-300x154.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/MYSQLconfig-600x308.png 600w\" sizes=\"auto, (max-width: 927px) 100vw, 927px\" \/><\/p>\n<p style=\"text-align: center\"><em>The contents of Bart\u2019s server MYSQL config file<\/em><\/p>\n<p>The information contained in the MYSQL database consists of the victims Unique IDentifier, the encryption key, BitCoin Address, Paid Status, and Timestamps.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16218\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database.png\" alt=\"\" width=\"1423\" height=\"868\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database.png 1423w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database-300x183.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database-600x366.png 600w\" sizes=\"auto, (max-width: 1423px) 100vw, 1423px\" \/><\/p>\n<p style=\"text-align: center\"><em>A small part of the table holding the ransomware information in the database.<\/em><\/p>\n<p style=\"text-align: left\">The Locky Bart server also contains a second database that contains further information on the victims of the ransomware.<\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16219\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database2.png\" alt=\"\" width=\"1427\" height=\"883\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database2.png 1427w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database2-300x186.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/database2-600x371.png 600w\" sizes=\"auto, (max-width: 1427px) 100vw, 1427px\" \/><\/p>\n<p style=\"text-align: center\"><em>Locky Bart ransomware\u2019s \u201cStats\u201d table example.<\/em><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16220\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/readme.png\" alt=\"\" width=\"2565\" height=\"942\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/readme.png 2565w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/readme-300x110.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/readme-600x220.png 600w\" sizes=\"auto, (max-width: 2565px) 100vw, 2565px\" \/><\/p>\n<p style=\"text-align: center\"><em>A \u201cReadMe\u201d file found on the server that seems to detail some features on the Stats database.<\/em><\/p>\n<p style=\"text-align: left\">The Locky Bart server contains a \u201cBTCwrapper.php\u201d which used a \u201ccontroller\u201d method that exposes a BTC Wallet Class that all other PHP files can call. This class initiates a connection to the Bitcoin servers through a username and password. This class contained complete methods on controlling and using the main BTC wallet set up by the criminal to store all the money received. This wallet is emptied regularly. This class can create new BTC Addresses as well and had the ability to empty those wallets on payment to the main wallet. There were also methods to check on the status of payments from each victim.<\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16221\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function5.png\" alt=\"\" width=\"1099\" height=\"1353\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function5.png 1099w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function5-244x300.png 244w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function5-487x600.png 487w\" sizes=\"auto, (max-width: 1099px) 100vw, 1099px\" \/><\/p>\n<p style=\"text-align: center\"><em>Some of the functions that the BTCWrapper Class calls.<\/em><\/p>\n<p style=\"text-align: left\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16222\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function6.png\" alt=\"\" width=\"1217\" height=\"1531\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function6.png 1217w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function6-238x300.png 238w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function6-477x600.png 477w\" sizes=\"auto, (max-width: 1217px) 100vw, 1217px\" \/><\/p>\n<p style=\"text-align: center\"><em>The first few functions of the BTCWrapper Class. The class uses CURL to contact a locally ran bitcoin server that communicates with the block chain.<\/em><\/p>\n<p>The Locky Bart server had 2 Bitcoin addresses where victims\u2019 payments were transferred to. The current one:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-16232 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain7671-600x218.png\" alt=\"\" width=\"600\" height=\"218\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain7671-600x218.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain7671-300x109.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain7671.png 1540w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><em>The current BTC address associated with Locky Bart has accumulated $ 7,671.60 in its life time.<\/em><\/p>\n<p>And a second one, that was referenced in PHP configurations on the malicious server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-16231 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain457806-600x216.png\" alt=\"\" width=\"600\" height=\"216\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain457806-600x216.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain457806-300x108.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blockchain457806.png 1546w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p style=\"text-align: center\"><em>An older BTC address also associated with Locky Bart had accumulated $ 457,806.06.<\/em><\/p>\n<p>The server portion of this ransomware was configured to function very similar to a legitimate business. It mirrored a \u201cSupport Ticket Department\u201d where the user could contact the ransomware support for any issues they may have experienced.<\/p>\n<p>The process was completely automated. The user would get infected and visit the site as their ransom note instructed. When they visited the site, the server would then generate their unique BTC address and present it to them automatically.<\/p>\n<p>After this, if the user made the decision to pay the ransom, but if they had any questions, they could literally contact support.<\/p>\n<p>If they did indeed make the decision to pay, they would proceed to buy Bitcoins through the many methods available (BTC ATM, LocalBitcoins \u2013 which allows you to meet people local to trade BTC for money or use banks and wiring like Western Union, or buy them with a credit card online).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16225\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/explained.png\" alt=\"\" width=\"800\" height=\"740\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/explained.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/explained-300x278.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/explained-600x555.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Once the user has the amount specified by the ransomware in their own BTC Wallet, they would then transfer the money from their wallet to the Payment Address the Ransomware Payment Page generated for them.<\/p>\n<p>The Ransomware Server checks every few minutes if a payment has been made for any of its victims and if the payment had been confirmed. Once the server verifies a payment they mark that victim in the Database as \u201cPaid\u201d.<\/p>\n<p>When a victim is marked as \u201cPaid\u201d the server then generates a \u201cDecryption Tool EXE\u201d and writes the users Encryption Key in the binary of that exe, and presents a link to download it on the personal payment page of the victim. Later when the victim checks their payment page again, they will see the link, download the tool, and decrypt their files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16226\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function7.png\" alt=\"\" width=\"973\" height=\"675\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function7.png 973w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function7-300x208.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/function7-600x416.png 600w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><\/p>\n<p style=\"text-align: center\"><em>The generation of the victim\u2019s decryption tool on the fly.<\/em><\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>This research into Locky Bart ransomware gives a great view of the side of a ransomware operation that we typically do not get to see, the backend. The criminals who run these operations do so on an extremely professional level, and users should always take an extra step in protecting themselves from these types of attacks.<\/p>\n<p>Ransomware will continue to grow and get more advanced and users need to make sure they are protected in the form of backup\u2019s, security application protection like <a href=\"https:\/\/www.malwarebytes.com\/premium\/\" target=\"_blank\">Malwarebytes<\/a>, and make sure they have some type of anti-ransomware technology protecting them from these advanced attacks. Users running Malwarebytes already have protection from ransomware, as Malwarebytes is equipped with our anti-ransomware technology.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/locky-bart-ransomware-and-backend-server-analysis\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/locky-bart-ransomware-and-backend-server-analysis\/' title='Locky Bart ransomware and backend server analysis'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/featureBart.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The developers of Locky Bart already had very successful ransomware campaigns running called \u201cLocky\u201d and \u201cLocky v2\u201d. After some users reported being infected with Locky Bart, we investigated it to find the differences as to gain greater knowledge and understanding of this new version.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/analysis\/\" rel=\"tag\">analysis<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/anti-ransomware\/\" rel=\"tag\">Anti-Ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/backend-server\/\" rel=\"tag\">backend server<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bart\/\" rel=\"tag\">bart<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/binary\/\" rel=\"tag\">binary<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky\/\" rel=\"tag\">Locky<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky-bart-ransomware\/\" rel=\"tag\">Locky Bart ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/locky-bart-ransomware-and-backend-server-analysis\/' title='Locky Bart ransomware and backend server analysis'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11151,11152,11153,11154,11155,10795,11156,3764,3765,10494],"class_list":["post-6446","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-analysis","tag-anti-ransomware","tag-backend-server","tag-bart","tag-binary","tag-locky","tag-locky-bart-ransomware","tag-malware","tag-ransomware","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6446"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6446\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}