BlackCat ransomware | AT&T Alien Labs
23 mins read

BlackCat ransomware | AT&T Alien Labs


This weblog was collectively written with Santiago Cortes. 

Govt abstract

AT&T Alien Labs™ is penning this report about not too long ago created ransomware malware dubbed BlackCat which was utilized in a January 2022 marketing campaign in opposition to two worldwide oil firms headquartered in Germany, Oiltanking and Mabanaft. The assault had little influence on finish clients, however it does serve to remind the cybersecurity group of the potential for risk actors to proceed assaults in opposition to vital infrastructure globally.

Key takeaways:

  • The ransomware BlackCat is coded in Rust and was created in November 2021.
  • Following tendencies noticed final 12 months by Alien Labs, the ransomware targets a number of platforms (Home windows and Linux), and it makes use of further code to contaminate VMware’s ESXi hypervisor.
  • Blackcat makes use of a “wall of disgrace” web site to each blackmail victims, show, and promote their newest campaigns publicly.
  • Campaigns stay energetic, with 16 identified incidents in February 2022 as of the publishing of this report.

Background

The 2021 ransomware assault on US-based Colonial Pipeline, which impacted the gasoline provide on the East Coast of America for a number of days, raised consciousness of the truth that adversaries are nicely ready to launch future cyberattacks globally that might severely influence a rustic’s infrastructure. Now, with confrontations within the Ukrainian area taking over new ranges of urgency, there may be heightened expectation of future risk actor campaigns in opposition to the vital infrastructure of western nations. The campaigns might take the type of ransomware assaults or information wiper assaults, as these have been the extremely profitable lately, particularly when mixed with provide chain assaults.

Evaluation

German newspaper Handelsblatt acknowledged the oil firms Oiltanking and Mabanaft had been affected by a ransomware assault on January 29, 2022, that impacted one of many key oil suppliers within the space. The assaults allegedly prompted Shell to re-route their provides so as to keep away from extreme impacts to the German gasoline provide. Even with these actions, it’s been acknowledged that 233 gasoline stations throughout Germany have been affected by the incident, leading to these stations having to run some processes manually and solely taking money fee.

The malware behind these assaults is named BlackCat ransomware, aka ALPHV, as reported by the identical newspaper. The group operates with a ransomware-as-a-service (RaaS) enterprise mannequin, the place the ransomware authors are entitled to 10-20% of the ransom fee, whereas the remainder is stored by the associates deploying the payload. After a profitable assault, victims who refuse to pay the ransom have their particulars posted on darkish internet boards to make assaults public, rising their notoriety and shaming the affected organizations. In line with these blogs, at the least 10 firms could have been impacted by these ransomware campaigns within the first two weeks of February.

Because the malware household operates as a RaaS, the preliminary entry vector depends upon the affiliate occasion deploying the payload and may range from one attacker to a different. Nevertheless, all of them seem to try to exfiltrate victims’ information earlier than beginning the encryption course of, gaining extortion energy for subsequent requests.

The BlackCat gang first appeared in mid-November 2021, and its payload is written within the Rust programming language, which is taken into account to have an identical efficiency to C/C++, however with higher reminiscence administration to keep away from reminiscence errors and concurrent programming. Moreover, it’s a cross platform language, permitting builders to focus on a number of working techniques with the identical code. For these causes, it has been voted because the “most cherished programming language” in Stack Overflow since 2016.

Other than the growing benefits Rust provides, the attackers additionally benefit from a decrease detection ratio from static evaluation instruments, which aren’t normally tailored to all programming languages. For this identical cause, Go Language had grow to be extra well-liked amongst malware coders throughout final 12 months, as seen in different blogs launched by Alien Labs, together with:

Rust has been current in malware samples for a few years, however BlackCat is the primary professionally/commercialized distributed malware household utilizing it, and probably the most affluent so far.

When executed, the malware provides a number of choices for customizing its execution. These choices have advanced since its first model, proven in determine 2 which compares one of many first samples out there (reported by MalwareHunterTeain December 2021) to the newest samples/variations.

BlackCat sample

Determine 1. @malwrhunterteam screenshot of execution.

Most arguments are non-compulsory, however access-token is enforced to bypass the dynamic evaluation carried out by automated sandboxes. Nevertheless, any token offered bypasses the restriction and permits malware execution. This token, along with the host universally distinctive identifier (UUID), is later used to establish the sufferer in a Tor web site hosted by the attackers, which shows the worth for the information decryptor.

Amongst these choices, Alien Labs has noticed how a few of them are particular to VMware ESXi. This inclusion follows tendencies noticed in 2021 amongst different well-liked RaaS teams, like DarkSide or REvil,  who added Linux capabilities to incorporate VMware ESXi of their scope of potential targets. The hypervisor ESXi permits a number of digital machines (VM) to share the identical onerous drive storage. Nevertheless, this additionally permits attackers to encrypt the centralized digital onerous drives used to retailer information from throughout VMs, doubtlessly inflicting disruptions to firms.

The BlackCat malware has code similar to its predecessors. It first goals to cease any operating VMs in ESXi. By doing this, the attacker ensures no different VM is dealing with the information to be encrypted, avoiding corruption problems with the encrypted information. Moreover, any ESXi snapshots are eliminated to harden restoration from the assault.

Extra preparation procedures are carried out by the BlackCat malware on Home windows techniques. For instance, it carries out some noisy actions that may be detected with Alien Labs correlation guidelines, as seen in Appendix A:

  • Delete Quantity Shadow Copies Companies to harden restoration from the assault. The command used is ‘vssadmin.exe Delete Shadows /all /quiet’.
  • Disables the restoration mode in BCDedit: ‘bcdedit.exe /set {default} recoveryenabled No’.
  • Maximize the worth of community requests the Server Service can take by altering the worth within the registry to 65535. This alteration eludes points accessing too many information directly throughout the encryption course of. The command used is: ‘reg add HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerParameters /v MaxMpxCt /d 65535 /t REG_DWORD /f ’.
  • If enabled, it makes an attempt to propagate with psexec into totally different techniques. The command runs from the %TEMP% folder, leveraging the credentials within the config file and the mum or dad’s execution choices for propagation choices. ‘psexec.exe -accepteula {Goal} -u {consumer} -p {password} -s -d -f -c {payload}.exe {inherited execution flags}’.
  • Clears all of the occasion logs with wevtutil with the command: ‘cmd.exe /c for /F “tokens=*” %1 in (‘wevtutil.exe el’) DO wevtutil.exe cl “%1″’.

Along with the choices proven in determine 1, the newest samples have added three further features that enhance the ransomware capabilities. These modifications preserve the road of labor already seen, with out together with any main modifications to the way in which the malware operates.

latest BlackCat sample

Determine 2. Newest pattern executed.

The present default configuration file appended with the newest noticed executable, consists of amongst others:

  • The general public key
  • The file extension to make use of for encrypted information, which corresponds to seven alphanumeric characters (0hzoagy for one of many newest samples)
  • A ransom word (see determine 3) incorporates the sufferer’s identify a number of instances in addition to the kind of information BlackCat has exfiltrated
  • An inventory of pre-obtained credentials from the sufferer which might be for use throughout execution
  • An inventory of companies the sufferer ought to kill based on the attacker, earlier than executing the encryption course of — normally companies modifying information that might corrupt information or backup companies that might grow to be counter-productive to the malicious execution. The checklist consists of: mepocs, memtas, veeam, svc$, backup, sql, vss, msexchange, sql$, mysql, mysql$, sophos, MSExchange, MSExchange$, WSBExchange, PDVFSService, BackupExecVSSProvider, BackupExecAgentAccelerator, BackupExecAgentBrowser, BackupExecDiveciMediaService, BackupExecJobEngine, BackupExecManagementService, BackupExecRPCService, GxBlr, GxVss, GxClMgrS, GxCVD, GxCIMgr, GXMMM, GxVssHWProv, GxFWD, SAPService, SAP, SAP$, SAPD$, SAPHostControl, SAPHostExec, QBCFMonitorService, QBDBMgrN, QBIDPService, AcronisAgent, VeeamNFSSvc, VeeamDeploymentService, VeeamTransportSvc, MVArmor, MVarmor64, VSNAPVSS, AcrSch2Svc.

BlackCat ransom note

Determine 3. Instance of ransom word.

  • An inventory of processes to be killed earlier than executing the encryption course of, with an identical goal because the companies checklist: agntsvc, dbeng50, dbsnmp, encsvc, excel, firefox, infopath, isqlplussvc, msaccess, mspub, mydesktopqos, mydesktopservice, notepad, ocautoupds, ocomm, ocssd, onenote, oracle, outlook, powerpnt, sqbcoreservice, sql, steam, synctime, tbirdconfig, thebat, thunderbird, visio, winword, wordpad, xfssvccon, *sql*, bedbh, vxmon, benetns, bengien, pvlsvr, beserver, raw_agent_svc, vsnapvss, CagService, QBIDPService, QBDBMgrN, QBCFMonitorService, SAP, TeamViewer_Service, TeamViewer, tv_w32, tv_x64, CVMountd, cvd, cvfwd, CVODS, saphostexec, saposcol, sapstartsrv, avagent, avscc, DellSystemDetect, EnterpriseClient, VeeamNFSSvc, VeeamTransportSvc, VeeamDeploymentSvc.
  • An inventory of excluded directories, filenames and file extensions to make sure the pc is operative after the encryption.
    • Directories: system quantity data, intel, $home windows.~ws, software information, $recycle.bin, mozilla, $home windows.~bt, public, msocache, home windows, default, all customers, tor browser, programdata, boot, config.msi, google, perflogs, appdata, home windows.previous.
    • Filenames: desktop.ini, autorun.inf, ntldr, bootsect.bak, thumbs.db, boot.ini, ntuser.dat, iconcache.db, bootfont.bin, ntuser.ini, ntuser.dat.log.
    • File extensions: themepack, nls, diagpkg, msi, lnk, exe, cab, scr, bat, drv, rtp, msp, prf, msc, ico, key, ocx, diagcab, diagcfg, pdb, wpx, hlp, icns, rom, dll, msstyles, mod, ps1, ics, hta, bin, cmd, ani, 386, lock, cur, idx, sys, com, deskthemepack, shs ,ldf, theme, mpa, nomedia, spl, cpl, adv, icl, msu.

The ransom word then factors to a Tor onion area with the sector ‘access-key=’ to establish the sufferer and present the worth to recuperate their information with the Decrypt App. Costs are indicated in Bitcoin and Monero, the newest has a reduction over Bitcoin.

Really helpful actions

  1. Preserve software program with the newest safety updates.
  2. Monitor and strongly, repeatedly talk to staff to not open and report suspicious emails.
  3. Use a backup system to backup server information.
  4. Set up Antivirus and/or endpoint detection and response on all endpoints.
  5. Be certain that two-factor authentication is enabled in all companies.

Conclusion

Latest ransomware assaults carried out on German oil suppliers had been profitable, however they didn’t have a big influence on the nation’s infrastructure. Nevertheless, contemplating geo-political occasions in Jap Europe, these assaults ought to function a robust reminder that organizations should stay on excessive alert in opposition to cyberattacks. They need to study current campaigns corresponding to these run with BlackCat malware to coach  groups and preserve up-to-date detections for the newest risk actor ways, methods, and procedures (TTPs). Like most assaults and risk actor campaigns, BlackCat ransomware can obtain Preliminary Entry utilizing many alternative variations which might be depending on the affiliate working the assault. Nevertheless, the payload might be very related for infections. Blue groups can use this technical data to enhance their readiness in opposition to the newest RaaS assaults.

Alien Labs will proceed to watch variations of BlackCat malware and can replace any actions on the Alien Labs Open Risk Trade™, which is a free, international open risk intelligence group with greater than 200,000 customers publishing up to date risk intelligence day by day. We ship this data within the type of “pulses” that may be shared publicly and privately. As well as, members of OTX can obtain thousands and thousands of indicators of compromise (IOCs), together with these related to BlackCat via integration with the platform.

Alien Labs is monitoring IOCs related to the geo-political battle in Jap Europe, via tagged pulses that monitor incident and associated risk intelligence. To get probably the most up to date data be part of OTX and go to this URL to see the total checklist of pulses related to potential campaigns which may be associated to the Ukranian/Russian battle and risk actors concentrating on different nations.   

Appendix A. Detection strategies

The next related detection strategies are in use by Alien Labs. They can be utilized by readers to tune or deploy detections in their very own environments or for aiding further analysis.

USM Wherever Correlation Guidelines

Eliminated all snapshots utilizing vimcmd

Home windows Shadow Copies Deletion

Home windows PSExec Utilization

Home windows PSExec Service Utilization

Home windows SMB Server Most Concurrent Requests Set To Most Worth

Home windows Occasion Log Eliminated with wevtutil

Suspicious Bcdedit Utilization

 

YARA RULES

rule BlackCat : WindowsMalware {

   meta:

      writer = "AlienLabs"

      description = "Detects BlackCat payloads."

      SHA256 = "6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896"


    strings:


        $rust = "/rust/" ascii broad


        $a0 = "vssadmin.exe Delete Shadows /all /quietshadow" ascii

        $a1 = "bcdedit /set {default}bcdedit /set {default} recoveryenabled No" ascii broad

        $a2 = "CompaniesLanmanServerParameters /v MaxMpxCt /d 65535" ascii broad

        $a3 = ".onion/?access-key=${ACCESS_KEY}" ascii broad


        $b0 = "config_id" ascii

        $b1 = "public_key" ascii

        $b2 = "extension" ascii

        $b3 = "note_file_name" ascii

        $b4 = "enable_esxi_vm_kill" ascii

        $b5 = "enable_esxi_vm_snapshot_kill" ascii



    situation:

        uint16(0) == 0x5A4D and filesize < 5MB and $rust and a couple of of ($a*) and three of ($b*)

}
rule LinuxBlackCat : LinuxMalware {

    meta:

        writer = "AlienLabs"

        description = "Detects BlackCat payloads."

        SHA256 = "5121f08cf8614a65d7a86c2f462c0694c132e2877a7f54ab7fcefd7ee5235a42"

    strings:

        $rust = "/rust/" ascii broad

        $a0 = "esxcli vm course of kill --type=power --world-id=" ascii broad

        $a1 = ".onion/?access-key=${ACCESS_KEY}" ascii broad


        $b0 = "config_id" ascii

        $b1 = "public_key" ascii

        $b2 = "extension" ascii

        $b3 = "note_file_name" ascii

        $b4 = "enable_esxi_vm_kill" ascii

        $b5 = "enable_esxi_vm_snapshot_kill" ascii


    situation:

        uint32(0) == 0x464c457f and filesize < 5MB and $rust and all of ($a*) and three of ($b*)

}

Appendix B. Related indicators (IOCs)

The next technical indicators are related to the reported intelligence. An inventory of indicators can also be out there within the OTX Pulse. Please word, the heart beat could embrace different actions associated however out of the scope of the report.

TYPE

INDICATOR

DESCRIPTION

SHA256

f2b3f1ed693021b20f456a058b86b08abfc4876c7a3ae18aea6e95567fd55b2e

Home windows BlackCat Payload

SHA256

cefea76dfdbb48cfe1a3db2c8df34e898e29bec9b2c13e79ef40655c637833ae

Home windows BlackCat Payload

SHA256

7e363b5f1ba373782261713fa99e8bbc35ddda97e48799c4eb28f17989da8d8e

Home windows BlackCat Payload

SHA256

f837f1cd60e9941aa60f7be50a8f2aaaac380f560db8ee001408f35c1b7a97cb

Home windows BlackCat Payload

SHA256

731adcf2d7fb61a8335e23dbee2436249e5d5753977ec465754c6b699e9bf161

Home windows BlackCat Payload

SHA256

7b2449bb8be1b37a9d580c2592a67a759a3116fe640041d0f36dc93ca3db4487

Home windows BlackCat Payload

SHA256

38834b796ed025563774167716a477e9217d45e47def20facb027325f2a790d1

Home windows BlackCat Payload

SHA256

40f57275721bd74cc59c0c59c9f98c8e0d1742b7ae86a46e83e985cc4039c3a5

Home windows BlackCat Payload

SHA256

b588823eb5c65f36d067d496881d9c704d3ba57100c273656a56a43215f35442

Home windows BlackCat Payload

SHA256

f815f5d6c85bcbc1ec071dd39532a20f5ce910989552d980d1d4346f57b75f89

Home windows BlackCat Payload

SHA256

0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479

Home windows BlackCat Payload

SHA256

c5ad3534e1c939661b71f56144d19ff36e9ea365fdb47e4f8e2d267c39376486

Home windows BlackCat Payload

SHA256

7154fdb1ef9044da59fcfdbdd1ed9abc1a594cacb41a0aeddb5cd9fdaeea5ea8

Home windows BlackCat Payload

SHA256

658e07739ad0137bceb910a351ce3fe4913f6fcc3f63e6ff2eb726e45f29e582

Home windows BlackCat Payload

SHA256

5bdc0fb5cfbd42de726aacc40eddca034b5fa4afcc88ddfb40a3d9ae18672898

Home windows BlackCat Payload

SHA256

c8b3b67ea4d7625f8b37ba59eed5c9406b3ef04b7a19b97e5dd5dab1bd59f283

Home windows BlackCat Payload

SHA256

bd337d4e83ab1c2cacb43e4569f977d188f1bb7c7a077026304bf186d49d4117

Home windows BlackCat Payload

SHA256

28d7e6fe31dc00f82cb032ba29aad6429837ba5efb83c2ce4d31d565896e1169

Home windows BlackCat Payload

SHA256

15b57c1b68cd6ce3c161042e0f3be9f32d78151fe95461eedc59a79fc222c7ed

Home windows BlackCat Payload

SHA256

4e18f9293a6a72d5d42dad179b532407f45663098f959ea552ae43dbb9725cbf

Home windows BlackCat Payload

SHA256

13828b390d5f58b002e808c2c4f02fdd920e236cc8015480fa33b6c1a9300e31

Home windows BlackCat Payload

SHA256

c3e5d4e62ae4eca2bfca22f8f3c8cbec12757f78107e91e85404611548e06e40

Home windows BlackCat Payload

SHA256

1af1ca666e48afc933e2eda0ae1d6e88ebd23d27c54fd1d882161fd8c70b678e

Home windows BlackCat Payload

SHA256

3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83

Home windows BlackCat Payload

SHA256

722f1c1527b2c788746fec4dd1af70b0c703644336909735f8f23f6ef265784b

Home windows BlackCat Payload

SHA256

d767524e1bbb8d50129485ffa667eb1d379c745c30d4588672636998c20f857f

Home windows BlackCat Payload

SHA256

aae77d41eba652683f3ae114fadec279d5759052d2d774f149f3055bf40c4c14

Home windows BlackCat Payload

SHA256

be8c5d07ab6e39db28c40db20a32f47a97b7ec9f26c9003f9101a154a5a98486

Home windows BlackCat Payload

SHA256

9f6876762614e407d0ee6005f165dd4bbd12cb21986abc4a3a5c7dc6271fcdc3

Home windows BlackCat Payload

SHA256

79802d6a6be8433720857d2b53b46f8011ec734a237aae1c3c1fea50ff683c13

Home windows BlackCat Payload

SHA256

2cf54942e8cf0ef6296deaa7975618dadff0c32535295d3f0d5f577552229ffc

Home windows BlackCat Payload

SHA256

bacedbb23254934b736a9daf6de52620c9250a49686d519ceaf0a8d25da0a97f

Home windows BlackCat Payload

SHA256

3c8ad2dae0b1bb536925b4e8d5a87e77c6134371eada2c7628358d6c6d3083dc

Home windows BlackCat Payload

SHA256

67d1f4077e929385cfd869bf279892bf10a2c8f0af4119e4bc15a2add9461fec

Home windows BlackCat Payload

SHA256

5a604a8f0e72f3bf7901b7b67f881031a402ab8072269c00233a554df548f54d

Home windows BlackCat Payload

SHA256

6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896

Home windows BlackCat Payload

SHA256

f8c08d00ff6e8c6adb1a93cd133b19302d0b651afd73ccb54e3b6ac6c60d99c6

Linux BlackCat Payload

SHA256

5121f08cf8614a65d7a86c2f462c0694c132e2877a7f54ab7fcefd7ee5235a42

Linux BlackCat Payload

SHA256

3a08e3bfec2db5dbece359ac9662e65361a8625a0122e68b56cd5ef3aedf8ce1

Linux BlackCat Payload

SHA256

f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083

Linux BlackCat Payload

SHA256

9802a1e8fb425ac3a7c0a7fca5a17cfcb7f3f5f0962deb29e3982f0bece95e26

Linux BlackCat Payload

 

Appendix C. Mapped to MITRE ATT&CK

The findings of this report are mapped to the next MITRE ATT&CK Matrix methods:

  • TA0005: Protection Evasion
    • T1070: Indicator Removing on Host
      • T1070.001: Clear Home windows Occasion Logs
    • T1078: Legitimate Accounts
      • T1078.003: Native Accounts
    • T1562: Impair Defenses
      • T1562.001: Disable or Modify Instruments
  • TA0010: Exfiltration
    • T1048: Exfiltration Over Different Protocol
      • T1048.002: Exfiltration Over Uneven Encrypted Non-C2 Protocol
  • TA0040: Influence
    • T1486: Knowledge Encrypted for Influence

Appendix D. Reporting context

The next checklist of sources was utilized by the report writer(s) throughout the assortment and evaluation course of related to this intelligence report.

  1. https://www.varonis.com/weblog/alphv-blackcat-ransomware
  2. https://unit42.paloaltonetworks.com/blackcat-ransomware

Alien Labs charges sources primarily based on the Intelligence supply and knowledge reliability score system to evaluate the reliability of the supply and the assessed stage of confidence we place on the knowledge distributed. The next chart incorporates the vary of potentialities, and the choice utilized to this report..

Supply reliability A1

RATING

DESCRIPTION

A – Dependable

Little doubt concerning the supply’s authenticity, trustworthiness, or competency. Historical past of full reliability.

B – Normally Dependable

Minor doubts. Historical past of principally legitimate data.

C – Pretty Dependable

Doubts. Offered legitimate data previously.

D – Not Normally Dependable

Vital doubts. Offered legitimate data previously.

E – Unreliable

Lacks authenticity, trustworthiness, and competency. Historical past of invalid data.

F – Reliability Unknown

Inadequate data to judge reliability. Could or is probably not dependable.

 

Data reliability A2

RATING

DESCRIPTION

1 – Confirmed

Logical, per different related data, confirmed by unbiased sources.

2 – In all probability True

Logical, per different related data, not confirmed.

3 – Probably True

Fairly logical, agrees with some related data, not confirmed.

4 – Doubtfully True

Not logical however doable, no different data on the topic, not confirmed.

5 – Inconceivable

Not logical, contradicted by different related data.

6 – Can’t be judged

The validity of the knowledge cannot be decided.

Suggestions

AT&T Alien Labs welcomes suggestions concerning the reported intelligence and supply course of. Please contact the Alien Labs report writer or contact labs@alienvault.com.



Leave a Reply

Your email address will not be published. Required fields are marked *