Original release date: November 29, 2018 | Last revised: December 03, 2018
Description
NotificationThis report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this bulletin or otherwise. This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see https://ift.tt/1qJcHPA. SummaryDescriptionThree artifacts were submitted for analysis. For a downloadable copy of IOCs, see: MAR-10164494.r1.v1.stix Submitted Files (3)738c95f5bfe63a530b200a0d73f363d46c5671c1fcbb69c217e15a3516501a86 (mswinupdate.exe) 9b23bfc35b18ed80104c496b2aa722b3e56ff9ceb9dae60d1aff7230321c1d12 (ClassLibrary1.dll) bbd4102fe25e73c0815d0c020d60d47dbbfbe79ef1e490e7b4f97640dd932b58 (g04inst.bat) Findings9b23bfc35b18ed80104c496b2aa722b3e56ff9ceb9dae60d1aff7230321c1d12Tagsdownloaderransomwaretrojan DetailsName | ClassLibrary1.dll |
---|
Size | 5120 bytes |
---|
Type | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows |
---|
MD5 | 76bd79f774ae892fd6a30b6463050a91 |
---|
SHA1 | 4d7a60bd1fb3677a553f26d95430c107c8485129 |
---|
SHA256 | 9b23bfc35b18ed80104c496b2aa722b3e56ff9ceb9dae60d1aff7230321c1d12 |
---|
SHA512 | 67e0046db0b565a1ac1862bbd536016c3ea984f8fceadaa31b4c99e7a8b434b170d5badbb10c2c25e264b17bbf2f97576f252e7ef74279b3b845b1553cef9829 |
---|
ssdeep | 48:6DhamfhRd4tvDo4Xbgj/aarU3LT88VMM8UX8i02+KfANbU7gjBRd1trWO8lGO+3L:m+5DoAbgfU88Spi0oANbsgjMPYp3XII |
---|
Entropy | 4.004964 |
---|
AntivirusAhnlab | Trojan/Win32.Black |
---|
Antiy | Trojan/Win32.AGeneric |
---|
BitDefender | Trojan.GenericKD.30369417 |
---|
ClamAV | Win.Trojan.Agent-6538241-0 |
---|
Cyren | W32/Trojan.URRI-3517 |
---|
ESET | a variant of MSIL/Runner.N trojan |
---|
Emsisoft | Trojan.GenericKD.30369417 (B) |
---|
Ikarus | Ransom.MSIL.Samas |
---|
K7 | Riskware ( 0040eff71 ) |
---|
McAfee | Ransomware-GJY!76BD79F774AE |
---|
Microsoft Security Essentials | Ransom:MSIL/Samas.D |
---|
NANOAV | Trojan.Win32.Runner.ffvfbl |
---|
Sophos | Troj/Samas-F |
---|
Symantec | Trojan.Gen.2 |
---|
Systweak | trojan.downloader |
---|
TrendMicro | TROJ_STUBDCRYP.A |
---|
TrendMicro House Call | TROJ_STUBDCRYP.A |
---|
Yara RulesNo matches found. ssdeep MatchesNo matches found. PE MetadataCompile Date | 2018-01-28 06:09:15-05:00 |
---|
Import Hash | dae02f32a21e03ce65412f6e56942daa |
---|
File Description | ClassLibrary1 |
---|
Internal Name | ClassLibrary1.dll |
---|
Legal Copyright | Copyright © 2018 |
---|
Original Filename | ClassLibrary1.dll |
---|
Product Name | ClassLibrary1 |
---|
Product Version | 1.0.0.0 |
---|
PE SectionsMD5 | Name | Raw Size | Entropy |
---|
34943f18fd2a99cc3f5cabe43b4765f8 | header | 512 | 2.547920 | 06219fe6e30e15dce12688ca2b434890 | .text | 3072 | 4.856670 | 11b58fc9ac45168b871cc50399b7c86c | .rsrc | 1024 | 2.888335 | ec45a535f38fb6dc4ac4ed7cbf63b754 | .reloc | 512 | 0.081539 |
DescriptionThis file is a .NET Class Library module designed to decrypt the encrypted data file with a ".stubbin” extension using a Rijndael encryption algorithm.
Displayed below is the encryption key and the initialization vector used for decryption.
--Begin encryption information-- rijndael.Key = hdfgkhioiugyfyghdseertdfygu rijndael.IV = ghtrfdfdewsdfgtyhgjgghfdg --End encryption information-- 738c95f5bfe63a530b200a0d73f363d46c5671c1fcbb69c217e15a3516501a86Tagsransomwaretrojan DetailsName | mswinupdate.exe |
---|
Size | 6144 bytes |
---|
Type | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
---|
MD5 | b96620d8a08fa436ea22ef480dd883ce |
---|
SHA1 | a1ab74d2f06a542e77ea2c6d641aae4ed163a2da |
---|
SHA256 | 738c95f5bfe63a530b200a0d73f363d46c5671c1fcbb69c217e15a3516501a86 |
---|
SHA512 | 2a9f4ebb025c8e7b4e074d301477656ffad66318da5ea35ddc8363c17f4bdbf501778539133261adbb9f441066a1e2b79240306ad1877f5ef17009c8f05ff4a6 |
---|
ssdeep | 48:6ZMMEikGAgS7zfMFmZUX7OLbqMMou6ZVqsPIUlf41cjGPRMfNFrbvZiJY527qnfF:/ikGAgS7b0807M+And6c6mBiJYPezNt |
---|
Entropy | 4.238961 |
---|
AntivirusAhnlab | Trojan/Win32.Samas |
---|
Antiy | Trojan[Ransom]/MSIL.Samas |
---|
Avira | TR/Samas.qybuh |
---|
BitDefender | Trojan.GenericKD.30367991 |
---|
Cyren | W32/Trojan.VYAP-2611 |
---|
ESET | a variant of MSIL/Runner.N trojan |
---|
Emsisoft | Trojan.GenericKD.30367991 (B) |
---|
Ikarus | Ransom.MSIL.Samas |
---|
K7 | Riskware ( 0040eff71 ) |
---|
McAfee | Ransomware-GJX!B96620D8A08F |
---|
Microsoft Security Essentials | Ransom:MSIL/Samas |
---|
NANOAV | Trojan.Win32.Generic.eymsce |
---|
NetGate | Malware.Generic |
---|
Sophos | Mal/Kryptik-BV |
---|
Symantec | Trojan.Gen.2 |
---|
Systweak | malware.shuriken |
---|
TrendMicro | TROJ_RUNNER.GBB |
---|
TrendMicro House Call | TROJ_RUNNER.GBB |
---|
Zillya! | Trojan.Samas.Win32.32 |
---|
Yara RulesNo matches found. ssdeep MatchesNo matches found. PE MetadataCompile Date | 2018-01-28 06:09:17-05:00 |
---|
Import Hash | f34d5f2d4577ed6d9ceec516c1f5a744 |
---|
Company Name | oiauoyqtfhqiwur578q26trgqiwue ffh iufiuqwytf 78wt8 |
---|
File Description | dkhjkasyfafa udfiu asd fuiysfd fiusdfh oiafiuay |
---|
Internal Name | rock2.exe |
---|
Legal Copyright | iusy ergy8wej udg uy |
---|
Original Filename | rock2.exe |
---|
Product Name | 98y4798t qiy er998ergg iuery 8 o8uieyfui qewhfiuoyafibuwy ey7fq iuyi |
---|
Product Version | 76.7.99.12 |
---|
PE SectionsMD5 | Name | Raw Size | Entropy |
---|
7f1dc4bd716bc037dea251c4dff12cdd | header | 512 | 2.538579 | c8076584486a2745281e4945da9b8b13 | .text | 3072 | 4.946272 | 1efe88aa4756d059ec1d3b49e342de5d | .rsrc | 2048 | 3.917395 | 7048daac38c935b38e086adcd8035d2a | .reloc | 512 | 0.081539 |
Packers/Compilers/CryptorsMicrosoft Visual C# v7.0 / Basic .NET |
DescriptionThis file is a PE32 .NET executable designed to search and load an encrypted data file with a ".stubbin" extension onto the victim's system. If the file exists, it will utilize the Rijndael algorithm in the Class Library file (ClassLibrary1.dll) to decrypt the data file. After decryption, the file deletes the encrypted data file. The encrypted file with a ".stubbin" extension was not available for analysis. bbd4102fe25e73c0815d0c020d60d47dbbfbe79ef1e490e7b4f97640dd932b58Tagsransomwaretrojan DetailsName | g04inst.bat |
---|
Size | 276 bytes |
---|
Type | ASCII text, with CRLF line terminators |
---|
MD5 | 02c19bbf8e19bb69fc7870ec872d355e |
---|
SHA1 | cc76586ef94122329e825c78aad2ecb9ac064343 |
---|
SHA256 | bbd4102fe25e73c0815d0c020d60d47dbbfbe79ef1e490e7b4f97640dd932b58 |
---|
SHA512 | 283681b5b8e78440bf474c8e50504e6e82f25bd3f6240d5e70600e43fc9fd609a78ee7b837c9b68aa25ed13f2ee735f360a18e614ded15e11bb62043cd028c99 |
---|
ssdeep | 6:JF1ZzA+QragXsoNLYjClAVyXHI+CIwZALICLA9XEUXR/JgW:L1J4aSJF+dyXo+Bb0LEUhyW |
---|
Entropy | 4.962735 |
---|
AntivirusMcAfee | BAT/Starter.h |
---|
Microsoft Security Essentials | Ransom:BAT/Samas |
---|
Sophos | Troj/RansRun-A |
---|
Symantec | Trojan.Malscript |
---|
Yara RulesNo matches found. ssdeep MatchesNo matches found. DescriptionThis file is a batch file designed to execute mswinupdate.exe with predefined arguments. Displayed below are the arguments:
--Begin arguments-- Format: %myrunner% %password% %path% %totalprice% %priceperhost% Sample: mswinupdate.exe juxtapositional 5 0.8 --End arguments-- RecommendationsNCCIC would like to remind users and administrators to consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts. - Maintain up-to-date antivirus signatures and engines.
- Keep operating system patches up-to-date.
- Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
- Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
- Enforce a strong password policy and implement regular password changes.
- Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
- Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
- Disable unnecessary services on agency workstations and servers.
- Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).
- Monitor users' web browsing habits; restrict access to sites with unfavorable content.
- Exercise caution when using removable media (e.g., USB thumbdrives, external drives, CDs, etc.).
- Scan all software downloaded from the Internet prior to executing.
- Maintain situational awareness of the latest threats and implement appropriate ACLs.
Additional information on malware incident prevention and handling can be found in NIST's Special Publication 800-83, Guide to Malware Incident Prevention & Handling for Desktops and Laptops. Contact InformationNCCIC continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.gov/forms/feedback/ Document FAQWhat is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact US-CERT and provide information regarding the level of desired analysis. What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact US-CERT and provide information regarding the level of desired analysis. Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the NCCIC at 1-888-282-0870 or soc@us-cert.gov. Can I submit malware to NCCIC? Malware samples can be submitted via three methods: NCCIC encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on US-CERT's homepage at www.us-cert.gov. |
Revisions
- December 3, 2018: Initial version
This product is provided subject to this Notification and this Privacy & Use policy.
from US-CERT National Cyber Alert System https://ift.tt/2rhjhRB