Over the past few years, ransomware has been hitting all the headlines. Group-IB’s recently-published Hi-Tech Crime Trends 2022/2023 report named ransomware the top cyber threat for businesses and organizations; the third year in a row that this particular threat has held this dubious honor. One of the key trends in the ransomware industry over the past five years has been big game hunting, which sees sophisticated threat actors attack medium- and large-sized companies and demand ever-growing ransom amounts.

However, the growing proliferation of various ransomware-as-a-service programs and initial access brokers (IABs) has lowered the barrier of entry for threat actors. Now, would-be cybercriminals can leverage a whole suite of cheap (or free) publicly available tools to try their hands at breaching a company’s security perimeter, giving less-skilled threat actors the chance to join the action.

In recent months, Group-IB has also seen an increasing turn by small-scale cybercriminals to target individuals, which could be done in the hope of infecting a personal device that an employee uses for work as a backdoor into stealing corporate files and credentials to then gain access to the network of the victim’s employer. With the help of off-the-shelf tools, launching a cyberattack has never been easier.

So, what tools are these cybercriminals using? Dubai-based researchers from Group-IB’s Digital Forensics and Incident Response (DFIR) team found that malicious actors, instead of simply infecting a computer with ransomware, have taken to packaging a whole host of malicious files into what we call malware bundles. A bundle is a term from the marketing sphere, whereby product bundling is a technique in which several products are grouped together and sold as a single unit for one price. This strategy has been credited for encouraging customers to buy more products. Resourceful cybercriminals appear to have monitored these trends, and thought, “how can we do something similar?” As a result, malware bundles are yet another example of how the cybercriminal industry bears ever-increasing resemblance to the IT sector, as malicious actors turn to adopting techniques from legitimate businesses for malicious purposes.

Malware bundles are often contained in phishing emails or disguised as legitimate files on download sites. Group-IB’s DFIR team has detected numerous malware bundle infections over the past year as a result of our presence in Europe, the Middle East, and Africa (EMEA). With this experience, Group-IB analysts leveraged the company’s proprietary Managed XDR to detonate the malicious files in a controlled environment after discovering similar cases in our clients’ infrastructure, along with Threat Intelligence to conduct further data-driven research.

During their analysis, Group-IB researchers found that a single downloadable file could contain a whole host of malware, including:

  • Downloaders: Downloaders prepare the scene, then drop and run more malicious files on the victim’s host.
  • Remote Access Trojans (RATs): RATs perform initial reconnaissance, evaluate assets, gain persistence, and can be used to sell access to backdoored endpoints. As remote or hybrid working continues to be the norm, companies are at huge risk if one of their employees’ personal devices is compromised.
  • Information stealers: Stealers steal credentials and exfiltrate them to command-and-control servers (C2) managed by cybercriminals, who often sell them on dark web forums and marketplaces.
  • Other payloads, such as miners, spam botnets, keyloggers, and ransomware.

Malware bundles have been around for a while, but their recent usage by cybercriminals reveals some interesting trends. First, it highlights how threat actors, with their ever-growing appetite for cash, create new approaches for monetization. Secondly, their usage can reveal insights into the interactions between low-skilled threat actors and their more sophisticated counterparts. An entry-level cybercriminal can leverage a malware bundle to gain access to a single computer, but they are also able to sell this access to a more-skilled threat actor who is able to move laterally from a single device to an entire corporate network. 

Malware bundles are especially threatening to companies given the continued shift towards hybrid or remote working following the emergence of COVID-19 in early 2020. According to a 2022 survey by jobseeker service FlexJobs, 87% of workers would prefer to carry out their duties remotely or in a hybrid format. This trend has raised multiple questions over employees’ use of their personal computers or smartphones for work.

Multi-factor authentication solution provider Beyond Identity found recently that roughly half of employees use one or more personal devices for work. These devices may have unpatched or out-of-date off-the-shelf antivirus solutions as their only protection; an acute risk if the user is accessing corporate documents through unsecured networks. This creates a wealth of opportunities for cybercriminals to potentially gain access to entire corporate networks by tricking individuals into interacting with spear-phishing emails or mistakenly downloading files, which they believe to be resources such as Windows updates or media files, but in fact contain malware bundles.

This blog post summarizes our experience in recent months and sheds light on initial infection vectors. It contains insights from our investigations into affected companies in Egypt, South Africa, Saudi Arabia, Turkey, Morocco, UAE, Kenya, Israel, Pakistan, India, and Germany. We discuss channels of delivery, malware attribution, tactics, techniques and procedures (TTPs), and bundled parts and roles, all in reference to the MITRE ATT&CK® (Adversarial Tactics, Techniques & Common Knowledge) framework, in order to detail how the cybercriminals gained initial access and secured persistence.

We recommend this blog to IT directors, heads of cybersecurity teams, SOC analysts, and incident response specialists. Our goal is to underscore the importance of raising cybersecurity benchmarks among all members of a company and organization, and emphasize how one infected personal device can cause great financial and reputational damage.

In the concluding section of this blog, our DFIR team gives its recommendations on how to secure your networks and protect against the growing threat of malware bundles. We are committed to sharing our knowledge and expertise to greater protect the digital space.

Unpacking the malware bundle

Firstly, it’s crucial to note that every malware bundle Group-IB analyzed comprised a unique mixture of different malware types. Some of the bundles included ransomware, others did not. Some contained a Remote Access Trojan (RAT), and others did not. Additionally, one bundle would contain one particular information stealer, and another bundle had a completely different stealer. As a rule, most malware bundles contain an information stealer, RAT, and downloader, although they can also contain some other interesting pieces of malware such as miners.

malware bundle components

Figure 1: What goes into a malware bundle?

Let us start by introducing the main protagonists of our research. It is no secret that info stealers are particularly popular on dark web forums and marketplaces. More and more threat actors are interested in stealing user data that they can sell on. This is one of the reasons why stealers have become an integral part of malware bundles. Group-IB researchers found that malware bundles often contained one of two highly popular stealers, RedLine Stealer and Vidar. As published in Group-IB’s recent Hi-Tech Crime Trends 2022/2023 report, Group-IB Threat Intelligence detected more than 35 million RedLine Stealer logs online in H2 2021 – H1 2022, with the malware responsible for compromising more than 75 million passwords. Vidar was the second most prominent stealer on the market in this period, as Group-IB detected 8.6 million Vidar logs online. In addition to these two widely-used stealers, the malware bundles also contained the lesser-known Amadey stealer.

Another component of malware bundles is DJVU/STOP ransomware. By mid-summer 2022, in 70% of the cases analyzed by Group-IB, this payload was loaded along with RedLine Stealer and PrivateLoader. Although the combination was highly effective, since mid-July, RedLine has increasingly been combined with miners, keyloggers, and a Trojan that recruits compromised systems to the Tofsee spam botnet. DJVU/STOP ransomware itself is seen to be used increasingly often together with Arkei Stealer and various RATs.

Group-IB Threat Intelligence dark web search engine detailing online enquiries for information stealers

Figure 2: Group-IB Threat Intelligence dark web search engine detailing online enquiries for information stealers.

In order to gain initial access on an individual’s device, cybercriminals often deliver malware bundles to their desired endpoint via phishing and hidden downloads. Malicious links are distributed via email, Twitter and Facebook posts, replies on Q&A forums, and the descriptions of YouTube videos.

Tweet screenshot with malicious link to download malware bundle

Figure 3: Tweet with malicious link to download malware bundle

Often the malware masquerades as patches, cracks, themes, and updates for Windows 11, and popular computer games, but the malware bundles can also be disguised as media files such as books. These delivery methods infect the personal device of an individual user, but this can have a devastating impact for their employer, should they use their personal device for work. Over the past few months, Group-IB Managed XDR has detected and prevented downloads of malware bundles on the devices of employees at various companies in Europe and the Middle East.

We couldn’t let this go unexamined.

Initial access vector

In all the malware bundles that were detected, the download of a file containing the package of malicious files was preceded by the user actively browsing and searching for specific files, including articles, books, and reports.

Browsing history of individual prior to downloading malware bundle

Figure 4: Browsing history of individual prior to downloading malware bundle.

While searching for information, users encountered a large number of insecure websites, often redirecting to third-party resources that required registration using an email address and phone number, as well as file-sharing resources that claimed to be offering the opportunity to download the sought-after files.

File-sharing page with link to download malicious file

Figure 5: File-sharing page with link to download malicious file.

The files often appeared as an archive with a simple password, and an additional link leading to the content delivery network (CDN) of the messaging app Discord was provided to download them. In general, Discord’s CDN has long been closely associated with the distribution of various malware, from adware and stealers to Trojans and ransomware. In our case, the CDN was used to deliver an entire bundle, but we will say more on that later.

Our research revealed that malicious archives were downloaded from the following websites:

  • https://digitalfitsoft[.]com
  • https://installmentloan7vrt[.]org
  • https://directdexchange[.]comhttps://soft-you[.]com
  • https://speednetpc[.]com
  • https://clubfiletyc[.]com
  • https://aditmedia.g2afse[.]com

After unpacking an archive, users received an executable file, which was then used as the initial dropper.

Initial activity

A user-initiated dropper performs network activity while interacting with various URLs and IP addresses. The IP addresses used include those belonging to the infrastructure of various information stealers and ransomware.

Markers related to malicious dropper activity as shown by Group-IB’s Malware Detonation Tool embedded into Threat Intelligence and Managed XDR

Figure 6: Markers related to malicious dropper activity as shown by Group-IB’s Malware Detonation Tool embedded into Threat Intelligence and Managed XDR.

The dropper checks the victim’s supported languages and external IP address, reads the computer name and Windows organization settings, modifies Windows certificates, and disables Windows Defender by setting the following registry keys:

  • HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring
  • HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable
  • HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection
  • HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification
  • HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection
  • HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring

While it is in operation, the dropper retrieves executables and configuration files from both C2 servers and Discord’s CDN. New files can be found in the user’s temporary internet files and the following locations:

  • C:\Users\<user>\AppData\Local\Temp\
  • C:\Users\<user>\Documents\
  • C:\Users\<user>\AppData\Roaming\
  • C:\Users\<user>\Pictures\Adobe Films\
  • C:\Program Files\PowerControl\

To prevent detection, the creation date and time of some files are timestomped. The code in the files is often obfuscated, such as in the following example below.

vAwzfVMYUmhMICuFBw=zSKYCyMWEBSlFFJvUjvw TNnInkTcdiDYuhCMCngD=ivwgHiZujayqwAtjdtTTAgzgjnauK NinALsvzQtTgtPnY=MnmkxxJnTeNe PTvUEXBAPNPWh=ZjpEQhzFIluzMOwSgJsHgqSpk Set WSHnnuOSJPlMCVTQyPriBojpzIlbZalYc=a tPoQMCQyPFcq=JuZjDKAtKSJyGYwB

Some executable files masquerade as images and have a .bmp extension.

An executable found in one malware bundle in a .bmp extension

Figure 7: An executable found in one malware bundle analyzed by Group-IB researchers that contained a .bmp extension.

After downloading the files, the dropper immediately launches most of the executable files. The main location used to store these files is C:\Users\<user>\Pictures\Adobe Films\.

The most commonly found files in the malware bundles include: RedLine Stealer, Vidar Stealer (v52.7, v52.9), Amadey Stealer (v3.21), PrivateLoader, and DJVU/STOP ransomware.

RedLine Stealer activity

RedLine was the most popular information stealer on the underground market in H2 2021 – H1 2022. Logs from RedLine Stealer made up more than 37% of the total number of stealer logs available online in this period. The stealer is constantly updated and can easily be found on underground forums at an affordable price of $100-150 for the standalone version and $150 per month оn a subscription basis. The official seller of RedLine Stealer actively uses Telegram for sending important announcements and communicating with clients, and there is a separate Telegram bot for buying the stealer. Any information about updates is first published on dark web forums.

RedLine Stealer activity malware packages

Figure 8: RedLine update notification parsed from dark web.

RedLine targets not only data from various browsers, but also information about the user, the system, any installed software, and, of course, credentials from files, FTP, VPN applications, Telegram, Discord, and cryptocurrency wallets.

The information is gathered according to the configuration file received from C2.

The main fields that can be highlighted in the configuration file are:

  • C2: IP addresses and URLs of C2 servers
  • Botnet: Name of the botnet
  • Auth_value: Authentication value
  • US: Immediate configuration, including data to be collected, as well as whitelisted countries

The list of countries where the stealer does not work often includes the following:

  • Armenia
  • Azerbaijan
  • Belarus
  • Kazakhstan
  • Kyrgyzstan
  • Moldova
  • Tajikistan
  • Uzbekistan
  • Ukraine
  • Russia

Some parameters in the configuration are encoded in Base64 — for example, the list of cryptocurrency wallets.

Part of RedLine Stealer’s configuration:

"*wallet*", "ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZ WpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlu bWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZ m5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbW NmbGN8TWF0aFdhbGxldApobmZhbmtub2NmZW9mYmRkZ2Npam5taG5mbmtkbmFhZHx Db2luYmFzZQpmaGJvaGltYWVsYm9ocGpiYmxkY25nY25hcG5kb2RqcHxCaW5hbmNlQ2hha W4Kb2RiZnBlZWloZGtiaWhtb3BrYmptb29uZmFubGJmY2x8Qn

After decoding, we get the names of more than 30 cryptocurrency wallets. All collected data is converted to XML and transmitted via SOAP Message either fully or partially to the C2. Starting with RedLine Stealer v22, NetTcpBinding provided by Windows Communication Foundation is used for communication. This makes it possible to generate a communication stack at runtime as well as use transport security, TCP for message delivery and binary message encoding.

During our research, we found the following С2:

  • net.tcp://193.106.191[.]81:23196/
  • net.tcp://193.124.22[.]7:35632/
  • net.tcp://185.215.113[.]70:21508/
  • net.tcp://ushatamaiet[.]xyz:80/
  • net.tcp://adinoreiver[.]xyz:80/
  • net.tcp://qulyneanica.com:80/

Vidar activity

According to Group-IB’s annual report into the top cyber threats, Vidar was the second most popular information stealer on the market, responsible for 9% of logs detected online in H2 2021 – H1 2022. Depending on its configuration, Vidar can target the browser’s autofill data, history, downloads, cookies, credit card and wallet data, Telegram data, credentials in files, and screen captures. In addition, Vidar users can specify files to be collected in the following format:

<Output path>;<Target path>;<File name list>;<Maximum file size>

For example, the string describing the files to be collected can look like this:

DESKTOP;%DESKTOP%\;*wallet*.*:*2fa*.*:*backup*.txt:*backup*.png:*backup*.jpg:*code*.txt:*code*.jpg:*password*.*:*auth*.txt:*auth*.png:*auth*.jpg:*crypto*.*:*key*.txt:*key*.png:*key*.jpg:*ledger*.*:*metamask*.*:*blockchain*.*:*[crypto wallet name redacted]*.*;300;true;movies:music:mp3;lnk;

Unless otherwise specified, by default, the collected data is saved to the folder C:\ProgramData\ and packed in a .zip archive before being exfiltrated to C2.

C:\ProgramData\ also contains the DLLs downloaded from C2 that are required by Vidar for it to carry out its malicious activity. The creation date and time of these DLLs are overwritten with earlier ones.

In one case seen by Group-IB, Vidar used Telegram channels to obtain the addresses of C2 servers. In the static Vidar configuration, the following parameters were specified:

Profile: 517

Version: 52.7

URL1: https://t[.]me/tg_superch

URL2: https://climatejustice[.]social/@olegf9844

URL marker: hello

The stealer queries the specified pages and parses the description looking for a marker.

C2 description format: <marker> <IP address> |

The threat actors are able to create as many Telegram channels as they need in order to share C2 data. Old channels close down, and new ones open with staggering regularity. In Hi-Tech Crime Trends 2022/2023, Group-IB researchers noted that cybercriminals are already replacing traditional C2 servers with Telegram bots and other exfiltration channels, and this trend is only going to intensify. This is already apparent from our research into malware bundles. If for any reason it is not possible to get C2 credentials from Telegram, an additional URL linking to profiles in various social networks and communities is used.

Social media profile with C2 IP address in description.

Figure 9: Social media profile with C2 IP address in description.

Interestingly, cybercriminals are now leveraging  the highly popular social network Mastodon for their malicious activity, underscoring their ability to harness new techniques and pathways. For example, two of the resources that the threat actors used for C2 purposes were mas[.]to and mastodon[.]social. They also used the domains climatejustice[.]social, ieji[.]de, koyu[.]space.

The following profiles were obtained from the samples discovered: https://mastodon[.]social/@olegf9844e, https://climatejustice[.]social/@olegf9844.

After collecting user data and sending it to the C2 server, Vidar deletes all traces of its presence.

Deletion of persistence traces, as shown by Group-IB’s Malware Detonation Tool

Figure 10: Deletion of persistence traces, as shown by Group-IB’s Malware Detonation Tool embedded into Threat Intelligence and Managed XDR.

DJVU/STOP EMEA Ransomware

Our special guest was DJVU/STOP ransomware. The initial dropper prepared everything necessary for its appearance by disabling Windows Defender and running the loader.

The cryptor itself is loaded in several stages using Process Hollowing. The loader launches its own executable file with the parameters –Admin IsNotAutoStart IsNotTask:

"C:\Users\<user>\Pictures\Adobe Films\<sample name>" --Admin IsNotAutoStart IsNotTask

The final payload is then injected into the created process and launched.

The first thing the payload does after being launched is collect data about the victim. It does so by querying https://api.2ip[.]ua/geo.json. The format of the data is as follows:

{
	"ip":"X.X.X.X",
	"country_code":"AE",
	"country":"United arab emirates",
	"country_rus":"Объединенные Арабские Эмираты",
	"country_ua":"Об'єднані Арабські Емірати",
	"region":"Dubayy",
	"region_rus":"Дубай",
	"region_ua":"Дубай",
	"city":"Dubai",
	"city_rus":"Дубай",
	"city_ua":"Дубай",
	"latitude":"XX.XXXXX",
	"longitude":"XX.XXXXX",
	"zip_code":"-",
	"time_zone":"+04:00"
}

The information obtained is used to check if the country is on the whitelist. The countries that have been whitelisted are Russia (RU), Belarus (BY), Ukraine (UA), Azerbaijan (AZ), Armenia (AM), Tajikistan (TJ), Kazakhstan (KZ), Kyrgyzstan (KG), Uzbekistan (UZ), and Syria (SY), and users based in these countries will not be attacked.

If the victim is not in any of the countries in the whitelist, DJVU/STOP creates a folder with the name generated from the victim’s UUID in C:\Users\<user>\AppData\Local\ and puts a copy of its executable file there. This file is later used for persistence via Run key, in which the SysHelper value is created:

Value name: SysHelper
Value type: RegExpandSz
Value: "C:\Users\<user>\AppData\Local\<sample path>\<sample name>" --AutoStart

Windows API functions are used to modify the registry key.

The same executable file is also used to create a “Time Trigger Task” in the scheduler by creating a COM object. Some parameters of these task are:

<Interval>PT5M</Interval>
<Duration>PT10M</Duration>
<WaitTimeout>PT5M</WaitTimeout>
<ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
<Actions Context="Author">
<Command>C:\Users\<user>\AppData\Local\<sample path>\<sample name></Command>
<Arguments>--Task</Arguments>

Next, the icacls utility is used to deny user permissions to a folder with malicious content.

icacls "C:\Users\<user>\AppData\Local\<sample path>" /deny *S-1-1-0:(OI)(CI)(DE,DC)

In all cases, one or more of the parameters below are used to explicitly specify the launch method:

Parameter Description
– – Admin IsAutoStart|IsNotAutoStart IsTask|IsNotTask Run as administrator

IsAutoStart: Creation of the “SysHelper” parameter in the Run registry key to start the ransomware

IsTask: Creation of the “Time Trigger Task” scheduled task to launch the ransomware

– – AutoStart Execution via Run key
– – Task Execution via Scheduled task
– – ForNetRes {PUB_KEY} {RANSOM_ID} IsAutoStart|IsNotAutoStart IsTask|IsNotTask Intended to be used to run on another host on the local network

PUB_KEY: RSA public key

RANSOM_ID: Ransom ID

IsAutoStart: Creation of the “SysHelper” parameter in the Run registry key

IsTask: Creation of a scheduled task

– – Service {PID} {PUB_KEY} {RANSOM_ID} Waiting for the specified process to complete and creating a “SysHelper” parameter in the Run registry key

PID: Process identifier

PUB_KEY: RSA public key

RANSOM_ID: Ransom ID

Depending on the launch method, the execution flow can vary.

The ransomware targets files located on local drives and network shares. After verifying the victim’s geolocation, the ransomware attempts to download files using the URLs specified in the configuration file and run them. The sample also attempts to download JSON data with the RSA public key and Ransom ID, which it saves in the text file “bowsakkdestx.txt”. If the download fails, hardcoded values of the RSA public key and Ransom ID are taken from the configuration.

Each configuration data parameter is contained in 10 or 16 blocks (block size is 151 bytes). The blocks are encrypted using a byte-by-byte XOR operation with a value of 80h.

Parameter Value
URL used to download JSON data with public RSA key and Ransom ID (10 blocks) http://acacacap[.]org/test3/get.php
Time-out for “Time Trigger Task” to be launched (10 blocks) “700”
Text of the ransom note (10 blocks) “ATTENTION!

Don’t worry, you can return all your files!

To get this software you need write on our e-mail:

support@bestyourmail.ch

Reserve e-mail address to contact us:

supportsys@airmail.cc

Your personal ID:

0505Jhyjd”

Extension of encrypted files (10 blocks) “.lloo”
List of substrings skipped during encryption (10 blocks) “ntuser.dat|ntuser.dat.LOG1|ntuser.dat.LOG2|ntuser.pol|.sys|.ini|.DLL|.dll|.blf|.bat|.lnk|.regtrans-ms|C:\SystemID\|C:\Users\Default User\|C:\Users\Public\|C:\Users\All Users\|C:\Users\Default\|C:\Documents and Settings\|C:\ProgramData\|C:\Recovery\|C:\System Volume Information\|C:\Users\%username%\AppData\Roaming\|C:\Users\%username%\AppData\Local\|C:\Windows\|C:\PerfLogs\|C:\ProgramData\Microsoft\|C:\ProgramData\Package Cache\|C:\Users\Public\|C:\$Recycle.Bin\|C:\$WINDOWS.~BT\|C:\dell\|C:\Intel\|C:\MSOCache\|C:\Program Files\|C:\Program Files (x86)\|C:\Games\|C:\Windows.old\|D:\Users\%username%\AppData\Roaming\|D:\Users\%username%\AppData\Local\|D:\Windows\|D:\PerfLogs\|D:\ProgramData\Desktop\|D:\ProgramData\Microsoft\|D:\ProgramData\Package Cache\|D:\Users\Public\|D:\$Recycle.Bin\|D:\$WINDOWS.~BT\|D:\dell\|D:\Intel\|D:\MSOCache\|D:\Program Files\|D:\Program Files (x86)\|D:\Games\|E:\Users\%username%\AppData\Roaming\|E:\Users\%username%\AppData\Local\|E:\Windows\|E:\PerfLogs\|E:\ProgramData\Desktop\|E:\ProgramData\Microsoft\|E:\ProgramData\Package Cache\|E:\Users\Public\|E:\$Recycle.Bin\|E:\$WINDOWS.~BT\|E:\dell\|E:\Intel\|E:\MSOCache\|E:\Program Files\|E:\Program Files (x86)\|E:\Games\|F:\Users\%username%\AppData\Roaming\|F:\Users\%username%\AppData\Local\|F:\Windows\|F:\PerfLogs\|F:\ProgramData\Desktop\|F:\ProgramData\Microsoft\|F:\Users\Public\|F:\$Recycle.Bin\|F:\$WINDOWS.~BT\|F:\dell\|F:\Intel\ “
Parameter is not used (10 blocks) “Select Dec…”
Name of the text file with ransom note (10 blocks) “_readme.txt”
List of URLs used to download files (16 blocks). If the substring “$run” is present after the URL, the downloaded file will also be executed.

Files are loaded to the %LOCALAPPDATA%\{UUID} directory, where UUID is the generated UUID

“http://rgyui[.]top/dl/build2.exe$run http://acacaca[.]org/files/1/build3.exe$run”
Public RSA key in PEM format with character escaping (16 blocks) Public Key RSA-2048

” —–BEGIN PUBLIC KEY—–\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvl+JOPkrW9VTv\/JiZrdb\\nLEm7qMCOlxSKL7GNqByzs8MBqaFYv3Hrfp8a8aiFttOTCmebqruweFD8\/5FJr9TV\\nXlc5WRN2qZ9plAjalgMpiRghV76fBZpvxMOf\/d5IgW88c0OgidqlDGzd8W9BMNUL\\np2C\/R\/jKB62S9UEvbyYbim2JC4Am7luAjgqn\/LVsFJw\/kz+RO7pHNMYml7BI\/ITc\\n+dRJk6ciR7oRNq\/amRb\/fRCf2MI0JBPyjx7XR0tvJCm0xxSGqYjPStTR7WZYhqtc\\nx4OG6RQP4SzI0WB\/4fA4CsiKMsyj4ndmMkXsRbs8RQieHgLuQi5mmaojsXu0tYn7\\nyQIDAQAB\\n—–END PUBLIC KEY—–“

Ransom ID identifier (16 blocks) “YfcXKGLzjXMjQRwrhUHzsXjmASQ6mo4zjmEj9st1”

It is worth noting that DJVU/STOP tries to encrypt “I:\5d2860c89d774.jpg” before actually encrypting user files.

Files are encrypted in multiple threads. The Salsa20 encryption algorithm is used to encrypt file contents. To get the encryption key and nonce Salsa20 for each file, a string with UUID is used. This string is generated using the Windows API functions UuidCreate and UuidToStringA. No more than 153,600 bytes are encrypted, starting from the 5th byte of the file data (counting from 0). Next, the line with UUID is encrypted with the RSA public key and appended to the end of the encrypted file along with the Ransom ID and the encrypted file token “{36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}”. As mentioned above, the RSA public key and Ransom ID can be preloaded via a URL specified in the ransomware configuration. When offline RSA key and Ransom ID values are used, the likelihood of decrypting files increases.

The ransomware creates a text file “_readme.txt” with the ransom demand in each processed directory, and additionally saves the Ransom ID in the text file “C:\SystemID\PersonalID.txt”.

DJVU/STOP ransom note

Figure 11: DJVU/STOP ransom note.

The cost of decrypting files is currently $980, a ransom sum that suggests that the cybercriminals are targeting individuals. However, there is a likelihood that the cybercriminals can also play the role of initial access brokers for more sophisticated threat actors.

The victim is also offered a 50% discount if they pay within 72 hours. Victims could try to find a decryptor on the Internet and decrypt the files by themselves, but they should be careful if they do. A large number of fake decryptors have appeared recently, and they are more likely to bring extra malware rather than decrypt files.

Other activity

We tried to focus on the most interesting pieces of the bundle, but there were many others. Thanks to the number of loaders, we landed the jackpot: a huge collection of malicious files. The most interesting of these are highlighted below.

Amadey Stealer (v3.21)

Amadey is a simple stealer that collects information from different mail agents using cred.dll launched via rundll32.exe. To obtain persistence, Amadey adds itself to Startup and creates a scheduled task.

cmd.exe /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\<user>\AppData\Local\Temp\62eca45584\
schtasks.exe /Create /SC MINUTE /MO 1 /TN bguuwe.exe /TR "C:\Users\<user>\AppData\Local\Temp\62eca45584\bguuwe.exe" /F

The following C2 was used during the stealer’s operation: 185.215.113[.]15/Lkb2dxj3/index.php.

Glupteba/RanumBot

The above sample is a Remote Access Trojan, which Group-IB observed in summer 2022, that exfiltrates system information and spreads itself using EternalBlue exploits. It hides behind the name “csrss.exe” and consists of different components:

  • Winmon.sys: Rootkit to hide processes
  • WinmonFS.sys: Rootkit to hide files and folders
  • WinmonProcessMonitor.sys: Rootkit to monitor and stop processes
  • injector.exe: Utility to inject DLLs into specified processes, used to inject NtQuerySystemInformationHook.dll into process of taskmgr.exe and hide malicious processes in Task Manager

The main module adds a firewall rule using a network shell (netsh) to allow incoming connections and uses a scheduled task to obtain persistence:

cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

Rootkits are installed as kernel drivers. Glupteba logs are sent to the following URL: https://sofolisk[.]com/api/log.

PrivateLoader.Downloader (v0.8)

This downloader proved helpful in our investigation. It used a proxy retrieved from the URL http://212.193.30[.]45/proxies.txt and IP addresses of C2 retrieved from:

  • http://212.193.30[.]29/server.txt
  • https://pastebin[.]com/raw/A7dSG1te
  • http://wfsdragon[.]ru/api/setStats.php
  • softs-portal[.]com/api/registerUser.php

The default C2 IP address 212.193.30[.]21 was also used.

One more URL was used to retrieve updates: https://vipsofts[.]xyz/files/mega.bmp.

This tiny sample helped us obtain not only additional samples of RedLine Stealer, Vidar Stealer, and DJVU/STOP, but also the following:

1. ModiLoader/DBatLoader. Downloader

Extracted URLs:

  • https://onedrive.live[.]com/download?cid=E8A357DC635F5F11&resid=E8A357DC635F5F11%21496&authkey=APDdIv0SZVO3OZw
  • https://ej2a0q.db.files.1drv[.]com

2. Downloader GCleaner

Extracted URLs:

  • http://212.192.246[.]99
  • http://31.210.20[.]149
  • http://212.192.241[.]16
  • http://203.159.80[.]49

3. PrivateDownloader. Downloader, Stealer

Extracted URLs:

  • http://193.233.185[.]125/download/NiceProcessX64.bmp
  • http://193.233.185[.]125/download/NiceProcessX32.bmp
  • https://cdn.discordapp[.]com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
  • https://c.xyzgamec[.]com/userdown/2202/random.exe
  • http://193.56.146[.]76/Proxytest.exe
  • http://www.yzsyjyjh[.]com/askhelp23/askinstall23.exe
  • http://91.241.19[.]125/pub.php?pub=one
  • http://privacy-tools-for-you-780[.]com/downloads/toolspab3.exe
  • http://luminati-china[.]xyz/aman/casper2.exe
  • https://innovicservice[.]net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
  • http://tg8.cllgxx[.]com/hp8/g1/yrpp1047.exe
  • https://cdn.discordapp[.]com/attachments/910842184708792331/930849718240698368/Roll.bmp
  • https://cdn.discordapp[.]com/attachments/910842184708792331/930850766787330068/real1201.bmp
  • https://cdn.discordapp[.]com/attachments/910842184708792331/930882959131693096/Installer.bmp
  • http://185.215.113[.]208/ferrari.exe
  • https://cdn.discordapp[.]com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
  • https://cdn.discordapp[.]com/attachments/910842184708792331/931285223709225071/russ.bmp
  • https://cdn.discordapp[.]com/attachments/910842184708792331/932720393201016842/filinnn.bmp
  • https://cdn.discordapp[.]com/attachments/910842184708792331/933436611427979305/build20k.bmp
  • http://mnbuiy[.]pw/adsli/note8876.exe
  • http://sarfoods[.]com/index.php
  • https://suprimax.vet[.]br/css/fonts/OneCleanerInst942914.exe
  • http://tg8.cllgxx[.]com/hp8/g1/ssaa1047.exe
  • https://www.deezloader[.]app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
  • https://www.deezloader[.]app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
  • https://cdn.discordapp[.]com/attachments/910281601559167006/911516400005296219/anyname.exe
  • https://cdn.discordapp[.]com/attachments/910281601559167006/911516894660530226/PBsecond.exe
  • https://cdn.discordapp[.]com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
  • https://iplogger[.]org/2BTmf7
  • https://iplogger[.]org/2BAmf7
  • https://iplogger[.]org/2BDmf7
  • https://iplogger[.]org/2BFmf7
  • https://iplogger[.]org/2s2pg6
  • https://iplogger[.]org/2s3pg6
  • https://iplogger[.]org/2s4pg6
  • https://iplogger[.]org/2s5pg6
  • https://iplogger[.]org/2s6pg6
  • https://iplogger[.]org/2s7pg6
  • https://cdn.discordapp[.]com/attachments/978284851323088960/991390417943797810/asp_correct.bmp
  • http://64.227.67[.]0/searchApp.exe

Finally, to obtain persistence, PrivateLoader.Downloader created a scheduled task using schtasks.exe.

creation of scheduled tasks by PrivateLoder.Downloader

Figure 12: How Group-IB’s Malware Detonation Platform Tool, embedded in Threat Intelligence and Managed XDR, tracks creation of scheduled tasks by PrivateLoder.Downloader

Final thoughts

Thanks to the different downloaders, we had a lot to analyze. The cherry on top of this beautiful malicious cake was the injection of a meterpreter into svchost. Seeing meterpreter, a classic in its own right, was a surprise for us. Meterpreter is part of Metasploit’s post-exploitation framework, which results in a malicious payload being injected into legitimate processes, allowing the threat actors to interact with the victim’s machine. Once widely used, Metasploit has, to a large extent, been replaced by Cobalt Strike, which is why its reemergence in these malware bundles was of great interest.

It is worth mentioning that stealers, which make up a major part of the bundle, can collect credentials for IABs. As noted in Hi-Tech Crime Trends 2022/2023, the number of advertisements describing compromised networks on underground forums more than doubled year-on-year in H2 2021 – H1 2022 to 2,348, and this trend is likely to continue as IABs play a greater role in the underground market. As seen with malware bundles, this could lead to more sophisticated threat actors gaining access to infected machines; not to mention the fact that such access can be granted directly by the meterpreter, which can also be injected by some of the malware found in the bundle. In such cases, the potential damage could be far greater than the initial ransom demand of $980 requested by the low-level threat actors leveraging DJVU/STOP ransomware, as access to an employee’s personal device gets passed up the cybercriminal food chain to more seasoned actors who could go on to penetrate an entire corporate network.

Our study of malware bundles sheds light on their variety. All of the malware packages examined by Group-IB were unique, and future bundles are sure to contain ever-more dangerous concoctions of malicious files. All this goes to show the danger that malware bundles pose to individuals across the globe, along with the companies and organizations they work for. One individual deciding to download a file on their personal computer, which they also use for work, could result in significant disruption and financial loss for the company. Malware bundles are not new, but the threat they pose is often underestimated by companies. Their circulation also underscores the potential damage that even rudimentary cybercriminals can bring to an organization.

Protecting against malware bundle – Recommendations

The recent spread of malware bundles in EMEA demonstrates how crucial it is for workplaces to foster a culture of cybersecurity and provide sufficient training to employees on how to spot phishing emails or malicious files hosted on file sharing sites. It’s also essential that companies provide employees with guidance and policies on how to work from home safely, such as maintaining up-to-date antivirus solutions and mandating the use of a secure corporate VPN that expands the organization’s security umbrella to personal devices.

For individuals
arrow_drop_down
  • Be cautious about downloaded apps and files from untrusted sources. Pay particular attention to executable files and archives.
  • Do not store credentials in web browsers or files — use password managers instead.
  • Enable Credential Guard in Windows Defender.
  • Make sure that your Windows OS is the latest available version and is supported by the vendor.
  • Make sure you have an activated reliable antivirus solution, and that the antivirus platform is updated to the most recent version and that the signature base is the latest one available.
  • Back up your most valuable data using cloud resources or keep offline copies of your data.
  • If your files become encrypted, reinstall the OS and change all your passwords that were stored in browsers, mail agents, and other places.
For enterprise
arrow_drop_down
  • Use Managed XDR or EDR solutions to detect and prevent malware attacks. Make sure you cover 100% of hosts using this security control
  • Use Threat Intelligence solutions to stay up-to-date and be aware of all current threats.
  • Regularly update your OS.
  • Do not store credentials in web browsers or files — use password managers instead.
  • Enable Credential Guard in Windows Defender.
  • Backup your most valuable data using best practices (cloud backup, offline backup or 3-2-1 model).
  • Train your employees to identify malicious resources with cybersecurity awareness training. Enhance your cybersecurity team’s skills through our training programs for technical specialists.
  • If your files become encrypted, scope all passwords that were stored in the OS, browsers, mail agents, etc. and change them immediately. Reinstall OS afterwards.

In line with Group-IB’s mission of fighting cybercrime, we will continue to explore the methods, tools, and tactics used by cybercriminals of varying motivations. We will also continue to inform and warn targeted organizations worldwide. We always strive to ensure that organizations under attack are notified as quickly as possible to help reduce potential damage. We also consider it our responsibility to share our findings with the cybersecurity community and encourage researchers to study different threats, share data, and use our technologies to combat cybercrime — together.

If you are interested in what we do and would like to become an expert in the same field, you can take our Technical training programs. We also welcome applications to join the Group-IB team. Please check our vacancies on the website.

MITRE ATT&CK®

Tactic Technique Description
TA0001 Initial Access T1566 Phishing Adversaries share malicious links and files via social media, forums, and specific websites
TA0002 Execution T1204 User Execution Adversaries rely on users to download and run malicious files
T1059 Command and Scripting Interpreter PowerShell and CMD are used to execute commands and launch modules
T1053.005 Scheduled Task System utility schtasks is used to execute malicious modules and files via scheduled tasks
T1106 Native API DJVU/STOP uses Windows API to run a new process before hollowing it
TA0003 Persistence T1547.001 Registry Run Keys / Startup Folder New values are created in the Run registry key and malicious files are added to startup
T1176 Browser Extensions Some stealers might add malicious extensions to obtain persistence and steal user information
T1053.005 Scheduled Task Scheduled tasks are created in order to obtain persistence
T1547.009 Shortcut Modification Some stealers might change browser-related shortcuts
TA0004 Privilege Escalation T1053.005 Scheduled Task Some scheduled tasks are created with /rl HIGHEST option
T1055 Process Injection Meterpreter is injected into the svchost.exe process
TA0005 Defense Evasion T1070.004 File Deletion Some files are deleted after execution
T1070.006 Timestomp Timestamps of specific files are changed to earlier ones
T1036 Masquerading Initial files masquerade as legitimate ones. Moreover, file extensions are changed to avoid detection
T1014 Rootkit Some samples in the bundle might deploy rootkits to hide malicious activity
T1027 Obfuscated Files or Information PowerShell commands are encoded in Base64. Some malicious files contain obfuscated code
T1222.001 Windows File and Directory Permissions Modification DJVU/STOP modifies permissions to prevent users from accessing malicious files
T1564.003 Hidden Window Some PowerShell commands are executed with the “-WindowStyle Hidden” option
T1562.001 Disable or Modify Tools Windows Defender real-time protection is disabled
T1562.004 Disable or Modify System Firewall Firewall rules are changed to allow programs with specific extensions
T1055.012 Process Hollowing Process Hollowing is used by DJVU/STOP to deploy its final payload
T1218.011 Rundll32 Rundll32 is used to launch malicious DLLs
TA0007 Discovery T1057 Process Discovery Some samples obtain information about running processes
T1012 Query Registry Information about the system, installed certificates, and configuration is obtained by querying specific registry keys
T1614 System Location Discovery Information about the system language and time zone is requested
T1033 System Owner/User Discovery Information about the system owner is discovered
T1007 System Service Discovery Tasklist utility is used to obtain information about installed services
T1135 Network Share Discovery DJVU/STOP checks network shares for further encryption
T1083 File and Directory Discovery Some samples try to discover specific files and locations
TA0009 Collection T1560 Archive Collected Data Vidar puts collected data into a zip archive
T1119 Automated Collection Browser cookies and profile data, wallets, credentials, and user files are collected automatically
T1005 Data from Local System Data are collected from the local system
T1074.001 Local Data Staging Vidar stages collected data in specific folders
T1114.001 Local Email Collection Some samples collect information from Outlook
T1113 Screen Capture Some samples create screenshots
TA0011 Command and Control T1071.001 Web Protocols HTTP and HTTPS are used to communicate with C2
T1105 Ingress Tool Transfer Additional files are transferred from C2 and file-sharing resources
T1095 Non-Application Layer Protocol RedLine uses net.tcp protocol provided by WCF
T1102.001 Dead Drop Resolver Vidar uses Telegram channels and social media profiles to extract IP address of C2
TA0010 Exfiltration T1020 Automated Exfiltration Collected data are exfiltrated automatically
T1041 Exfiltration Over C2 Channel Stealers send collected data to their C2
TA0040 Impact T1486 Data Encrypted for Impact Files on the local host, connected drives, and network shares are encrypted