malware.news Open in urlscan Pro
2606:4700:20::681a:769  Public Scan

URL: https://malware.news/t/threat-actor-believed-to-be-spreading-new-medusalocker-variant-since-2022/87047
Submission: On October 04 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

POST /login

<form id="hidden-login-form" method="post" action="/login" style="display: none;">
  <input name="username" type="text" id="signin_username">
  <input name="password" type="password" id="signin_password">
  <input name="redirect" type="hidden">
  <input type="submit" id="signin-button" value="Log In">
</form>

Text Content

Skip to main content

Log In
 * 
 * 
   



THREAT ACTOR BELIEVED TO BE SPREADING NEW MEDUSALOCKER VARIANT SINCE 2022

Malware News


You have selected 0 posts.

select all

cancel selecting

Oct 3
1 / 1
Oct 3

22h ago

MalBot
22h

 * Cisco Talos has discovered a financially motivated threat actor, active since
   2022, recently observed delivering a MedusaLocker ransomware variant. 
 * Intelligence collected by Talos on tools regularly employed by the threat
   actor allows us to see an estimate of the amount and countries of origin of
   this group’s victims. This actor has been active since at least late 2022 and
   targets organizations worldwide, although the number of victims was higher
   than average in EU countries until mid-2023 and, since then, in South
   American countries.
 * This threat actor was observed distributing a MedusaLocker ransomware variant
   known as “BabyLokerKZ.” This variant is compiled with a PDB path containing
   the word “paid_memes” that is also present in other tools observed during the
   attacks, presumably by the same author.
 * Talos has new information on the attacker’s tools, including BabyLockerKz and
   attacker TTPs and IOCs to assist in detecting and preventing further attacks.

Talos has recently observed an attack leading to the deployment of a
MedusaLocker ransomware variant known as “BabyLockerKZ.” The distinguishable
techniques — including consistently storing the same set of tools in the same
location on compromised systems, the use of tools that have the PDB path with
the string “paid_memes,” and the use of a lateral movement tool named “checker”
— used in the attack led us to take a deeper look to try to understand more
about this threat actor. 

This attacker uses several publicly known attack tools and living-off-the-land
binaries (LoLBins), a set of tools built by the same developer (possibly the
attacker) to assist in credential theft and lateral movement in compromised
organizations. These tools are mostly wrappers around publicly available tools
that include additional functionality to streamline the attack process and
provide graphical or command-line interfaces. 

The same developer built the MedusaLocker variant used in the initial attack.
This variant that uses the same chat and leak site URLs contains several
differences to the original MedusaLocker ransomware, such as a different autorun
key or an extra public and private key set stored in the registry. Based on the
name of the autorun key, the attackers call this variant “BabyLockerKZ.” 

We assess with medium confidence that the actor is financially motivated, likely
working as an IAB or an affiliate of a ransomware cartel, and has been carrying
out attacks since at least 2022. Our telemetry indicates that the actor
opportunistically targeted many victims worldwide. In late 2022 and early 2023,
most victims were in European countries, but since the first quarter of 2023,
the group’s focus shifted toward South American countries and, as a result, the
number of victims per month almost doubled.


TRACKING BABYLOCKERKZ ACROSS THE GLOBE

Intelligence collected by Talos on tools regularly employed by the threat actor
allows us to estimate the number of, and the countries of origin of the victims.
Although this is unlikely to capture all of the adversary’s activities, it still
provides a look at a specific window of activity.

The actor has been active since at least October 2022. At that time, the targets
were mostly located in European countries such as France, Germany, Spain or
Italy. During the second  quarter of 2023, the attack volume per month almost
doubled, and the group shifted its focus toward South American countries such as
Brazil, Mexico, Argentina and Colombia, as shown in the chart below. The attacks
kept a steady volume of around 200 unique IPs compromised per month until the
first quarter of 2024 when the attacks decreased.

The actor has consistently compromised a large number of organizations, often
more than 100 per month, since at least 2022. This reveals the professional and
highly aggressive nature of the attacks and is coherent with the activity we
would expect from an IAB or ransomware affiliate.


ATTACKER TTPS AND TOOLS

During the attack leading to the deployment of the BabyLockerKZt, the adversary
used several publicly known attack tools and others that could be unique to this
actor. The group frequently used the Music, Pictures or Documents user folders
of compromised systems to store attack tools. For example, the following paths
were used to store tools during this attack:

 * c:\users\<user>\music\advanced_port_scanner_2.5.3869.exe
 * c:\users\<user>\music\hrsword\hrsword install.bat
 * c:\users\<user>\music\killav\build.004\disabler.exe
 * c:/users/<user>/music/checker/checker(222).exe
 * c:/users/<user>/music/checker/invoke-thehash.ps1
 * c:/users/<user>/music/checker/checker (222).exe
 * c:/users/<user>/music/checker/invoke-smbexec.ps1
 * c:/users/<user>/music/checker/invoke-wmiexec.ps1
 * c:/users/<user>/appdata/roaming/ntsystem/ntlhost.exe.exe
 * c:/users/<user>/appdata/local/temp/advanced port scanner
   2/advanced_port_scanner.exe
 * c:/users/<user>/appdata/local/temp/is-juad3.tmp/advanced_port_scanner_2.5.3869.tmp

These are similar to a previous attack leading to MedusaLocker ransomware,
documented by ASEC in February 2023, which our telemetry suggests was a more
active period for this threat actor.

Some of the publicly known tools used by the attacker are:

 * HRSword_v5.0.1.1.rar: A tool used to disable AV and EDR software.
 * Advanced_Port_Scanner_2.5.3869.exe: A network-scanning tool with several
   additional features to map internal networks and devices.
 * Netscan.exe: SoftPerfect Network Scanner: A tool similar to Advanced Port
   Scanner.
 * Processhacker.exe: Process Monitoring and administration software. Allows a
   TA to enumerate and control processes running on the infected endpoint.
 * PCHunter64.exe: A tool similar to processhacker.
 * Mimikatz: A tool to dump Windows user credentials from memory.

While most of the tools the attacker uses are publicly available, they also use
some tools that are not widely distributed that streamline the attack process by
automating the interaction between popular attack tools (e.g., Mimikatz,
Invoke-the-hash, PSEXEC, RDP) and by adding convenient functionality and
interfaces. One of these tools, called “Checker” used in an attack that deployed
BabyLockerKZ, consisted of pivotal characteristics of BabyLockerKZ, the
“Checker” tool has a PDB path containing the string “paid_memes”. Pivoting off
this string, we identified files on VirusTotal, of which most are BabyLockerKZ
samples. We also discovered several other tools, which we’ll outline below.


CHECKER TOOL

Checker (E:\paid_memes\wmi_smb_rdp_checker\Release\checker.pdb) is an app that
bundles several other freely available apps and provides a GUI for management of
credentials as the attackers proceed with lateral movement. In particular it
contains a set of tools:

 * Remote Desktop Plus
 * PSEXEC
 * MIMIKATZ

And a set of scripts based on the Invoke-TheHash tool.

The tool also contains a GUI, as shown below, and a database to store the
credentials.

As the image illustrates, the tool can be used to scan IPs for valid credentials
using several protocols/techniques (PSEXEC, RDP, SMB and WMI) and is prepared to
import data from lists of hosts and some of the tools in the attacker toolset,
such as Mimikatz, as well as an advanced port scanner. The tool can also decrypt
hashes and offers the convenience of a GUI to store a database of the hosts and
respective credentials that have been obtained or verified.


PTH PROJECT

The PTH (D:\Projects\paid_memes\PTH\Release\PTH.pdb) name suggests the
pass-the-hash technique to use NTLM hashes to authenticate remotely without
having to crack the password. Looking at its resources it embeds:

 * Invoke-SMBClient.ps1
 * Invoke-SMBEnum.ps1
 * Invoke-SMBExec.ps1
 * Invoke-TheHash.ps1
 * Invoke-WMIExec.ps1

These were also used in the checker tool and are part of Invoke-TheHash.
According to the author: 

“Invoke-TheHash contains PowerShell functions for performing pass the hash WMI
and SMB tasks. WMI and SMB connections are accessed through the .NET TCPClient.
Authentication is performed by passing an NTLM hash into the NTLMv2
authentication protocol. Local administrator privilege is not required
client-side.”


MIMIK TOOL

MIMIK (D:\Projects\paid_memes\mimik\Release\stub_mimik.pdb) is a wrapper around
Mimikatz and rclone that can be used to steal credentials and automatically
upload them to an attacker-controlled server. The following image shows the
terminal output for the tool.

The following command lines are examples of commands executed via the tool:

 * 64.exe privilege::debug sekurlsa::logonPasswords token::elevate lsadump::sam
   full exit 
 * C:\Users\user\Desktop\64.exe 64.exe "privilege::debug"
   "sekurlsa::logonPasswords" "token::elevate" "lsadump::sam full" exit 
 * 64.exe "privilege::debug" "sekurlsa::logonPasswords" "token::elevate"
   "lsadump::sam full" exit
 * C:\Users\user\Desktop\rclone.exe rclone rcd --rc-no-auth --bwlimit=30M
 * C:\Users\user\Desktop\rclone.exe rclone rc operations/stat


BABYLOCKERKZ

BabyLockerKZ is a variant of MedusaLocker that has been around at least since
late 2023 and has been analyzed by other researchers, although not specifically
called out as a MedusaLocker variant with this name. 

A Cynet blog post on the malware used the name “Hazard” for a MedusaLocker
variant (named after the extension used for encrypted files) and mentions the
existence of the BabyLockerKZ registry key. 

Another post from Whitehat mentions the existence of PAIDMEMES PUBLIC and
PRIVATE registry keys on a MedusaLocker sample. 

This variant has not been given much attention outside of that, though, possibly
because it’s highly similar to MedusaLocker or because it uses the same chat and
leak sites as MedusaLocker. But there are several notable differences between
BabyLockerKZ and MedusaLocker, such as:

 * No {8761ABBD-7F85-42EE-B272-A76179687C63} mutex.
 * No MDSLK reg key.
 * The PAIDMEMES Public and private keys.
 * The BabyLockerKZ run key.

The use of the PAIDMEMES public and private keys is unclear. In their post,
Whitehat mentioned that they believe the keys aren’t necessary for the
encryption process, as the Linux version doesn’t use them. Further research into
the use of these keys might be a topic for another blog post.


COVERAGE

Ways our customers can detect and block this threat are listed below.

Cisco Secure Endpoint (formerly AMP for Endpoints) is ideally suited to prevent
the execution of the malware detailed in this post. Try Secure Endpoint for free
here.

Cisco Secure Web Appliance web scanning prevents access to malicious websites
and detects malware used in these attacks.

Cisco Secure Email (formerly Cisco Email Security) can block malicious emails
sent by threat actors as part of their campaign. You can try Secure Email for
free here.

Cisco Secure Firewall (formerly Next-Generation Firewall and Firepower NGFW)
appliances such as Threat Defense Virtual, Adaptive Security Appliance and
Meraki MX can detect malicious activity associated with this threat.

Cisco Secure Network/Cloud Analytics (Stealthwatch/Stealthwatch Cloud) analyzes
network traffic automatically and alerts users of potentially unwanted activity
on every connected device.

Cisco Secure Malware Analytics (Threat Grid) identifies malicious binaries and
builds protection into all Cisco Secure products.

Umbrella, Cisco’s secure internet gateway (SIG), blocks users from connecting to
malicious domains, IPs and URLs, whether users are on or off the corporate
network. Sign up for a free trial of Umbrella here.

Cisco Secure Web Appliance (formerly Web Security Appliance) automatically
blocks potentially dangerous sites and tests suspicious sites before users
access them. 

Additional protections with context to your specific environment and threat data
are available from the Firewall Management Center.

Cisco Duo provides multi-factor authentication for users to ensure only those
authorized are accessing your network. 

Open-source Snort Subscriber Rule Set customers can stay up to date by
downloading the latest rule pack available for purchase on Snort.org. SIDs for
this threat: Snort3 Rules: 1:300998:1:0 Snort2 Rules: 1:63928:1:0, 1:63929:1:0

ClamAV detections are also available for this threat:
Win.Ransomware.MedusaLocker-10035000-1
Win.Tool.PassTheHash-10034996-0
Win.Ransomware.MedusaLocker-10035000-0


INDICATORS OF COMPROMISE

IOCs for this research can be found at our Github repository here

BabylockerKZ:

33a8024395c56fab4564b9baef1645e505e00b0b36bff6fad3aedb666022599a

b8c994e3ed7dcc9080916119ddc315533c129479f508676d7544b82b2e24745f

63eb3d2886d9cb880c9b0d54b94f3e149b3b5b6215a33a0ef63588a09dcd4499

270c3354b3ee2940b499e365eaba143fba9d458f434dc38e663dc0f08e96121e

759b96f44806578cc0836a3a2bf11c8bc553effac72f8d28b94aec78b66be906

PTH:

9f066975f1e02b29c7c635280f405c59704ce4f4e06b04e9ac8a7eac22acd3c7

8bc455e5de35290f8a94376357947bd72aaf6f4d452c25a8ef444e037ef76b9f

Checker:

d00f7cf6af68ba832b9d364f28411346cfe66fd3b1f5bcac318766add29ff7f0

1f2df15442593b159e45d16a27e4d43d3a9062da212a588ba4c048f214a0b7be

1e9246e6a35731143368eaa0ade4f3cf576d6b22e6090152f6e94f1fa3070651

6ae3a58a78be9c606009c657de4e390538b21ad951e62b6f4d31138e1a75732c

2eddfe711c32ef1668e14a10d00452c83c29e394e17c41f491550a1583c1bcac

HOHOL1488:

dc4840a0992b218cbedd5a7ac5c711cb98f1f9e78a8ffdea37c694061dfd34c6

48046fb0e566f5a2d184f84b76d6cadc458762556daed0ae4a3a1200afbefb54

c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801

012657c4548d9c98223caa4cc7aa52fc083d6983d42fde16ca3271412e7fe3fe

8edbb1944d94ff91ee917c31590b6d1d5690a52fc153e44355ee9749aa0f4625

364f1b7466d8e4c9f55294ecf1f874c763bcf980c59b0250c613ac366def6aca

5d5d639fdfbf632bb7d9f1bb28731217d09d36078ab5e594baf2a5a41267a5d2

PDB list:

d:/projects/paid_memes/virus/release/stub.pdb

e:/locker/bin/stub_win_x64_encrypter.pdb

i:/locker/bin/stub_win_x64_encrypter.pdb

d:/education/locker/bin/stub_win_x64_encrypter.pdb

d:/education/locker/bin/stub_win_x86_encrypter.pdb

d:/projects/paid_memes/wmi_smb_rdp_checker/release/checker.pdb

d:/projects/paid_memes/mimik/release/stub_mimik.pdb

i:/locker/x64/release/phantom.pdb

d:/projects/paid_memes/pth/release/pth.pdb

Registry keys:

HKEY_USERS\%SID%\SOFTWARE\PAIDMEMES\PRIVATE

HKEY_USERS\%SID%\SOFTWARE\PAIDMEMES\PUBLIC

HKEY_CURRENT_USER\SOFTWARE\PAIDMEMES\PUBLIC

HKEY_CURRENT_USER\SOFTWARE\PAIDMEMES\PRIVATE

HKCU\SOFTWARE\PAIDMEMES\PUBLIC

HKCU\SOFTWARE\PAIDMEMES\PRIVATE

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BabyLockerKZ

HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BabyLockerKZ

HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Run\BabyLockerKZ

Extension names observed being used by BabyLockerKZ samples:

crypto125

crypto1317

crypto165

crypto41

crypto76

encrypted1

hazard11

hazard21

hazard23

hazard24

hazard25

hazard27

hazard31

hazard38

hazard49

hazard55

hazard56

hazard7

infected

lock2

lock3

lock5

locked9

lockfiles

meduza210

rapid1

rapid10

readtext13

readtext47

readtext49

recovery29

recovery70

virus2

virus3

virus57

Encryption key BabyLockerKZ:

PUTINHUILO1337

MUTEX BabyLockerKZ:

HOHOL1488

Article Link: Threat actor believed to be spreading new MedusaLocker variant
since 2022 5







Reply



NEW & UNREAD TOPICS

Topic Replies Views Activity AI: The new puppet master behind cyberattacks
Malware News
0 308 Nov 2023 Cyber Siege: The Growing Threat to the US Healthcare
Malware News
0 245 Jan 8 Threat Intelligence Snapshot: Week 11, 2024
Malware News
0 391 Mar 14 CVE-2024-21115: An Oracle VirtualBox LPE Used to Win Pwn2Own
Malware News
0 643 May 9 SigmaHQ Rules Release Highlights — r2023–11–06
Malware News
0 334 Nov 2023


WANT TO READ MORE? BROWSE OTHER TOPICS IN MALWARE NEWS OR VIEW LATEST TOPICS.




Powered by Discourse




Invalid date Invalid date