• Skip to primary navigation
  • Skip to main content
  • Skip to footer
lab52

lab52

The threat intelligence division of S2 Grupo

  • Home
  • Faq
  • Blog
  • About
  • Contact

RansomHub Ransomware – New Infection Chains Unveiled

July 26, 2024

From Lab52, we are very aware that in the fight against ransomware, we must not focus solely on the final artifact but must pay attention to every phase of deployment. Unfortunately, it will not always be possible to accurately identify the entire infection chain, as highlighted in the latest statistics by Coveware.

The objective of this post is to contribute to early detection by sharing relevant parts of the observed infection chain in two ransomHub cases. In a recent post of Unit42 (Paloalto), a new variant of this ransomware is mentioned. In our case, one of the samples (sample2.exe shown bellow) appears to be intermediate between the published version and previous versions of this ransomware.

General characteristics

The hashes for both samples are provided in the following table. sample1.exe was analysed months ago, while sample2.exe has been seen in the field during june 2024.

NameSha256
sample1.exefb78afe826a14d4e0cc883fcdb6fe339e45a3fe728e575137b231aec6418a18f
sample2.exe3dabecacc40e2904beba9372e95cf25cec8bb021c080f5d892fbf2eeb0e97006

Command-line arguments

Both samples can be executed with options specified via the command line. However, sample1.exe includes, by default, the shutdown of virtual machines. This can be seen during its execution, and there is no option to avoid this behaviour.

Options for sample1.exe

Sample2.exe includes this option, along with the “fast encryption mode”:

Options for sample2.exe

Both samples require a password in order to execute. Moreover, both samples are protected to avoid the static analysis, using obfuscation methods.

Obfuscation methods

RansomHub is developed in Go. It uses an open-source obfuscator called Garble, which hinders analysis in two ways.

The first is by removing module names and replacing some with random character strings. To recover some module names, the GoReSym tool can be used, with usage instructions available on its respective GitHub page.

The second method is by obfuscating the executable strings. To decrypt them, the script described in the OALabs report can be used. It is important to note that this script does not decrypt all the strings, as some functions are optimized, causing the pattern to stop working.

Infection chain

The samples were deployed using different tactics. In case of sample1.exe, the actors behind the attack used tools such as Advanced Port Scanner and ScreenConnect between others, in order to discover devices to be infected.

Infection chain – sample1.exe

During the deployment of sample2 the cybercriminals used obfuscated PowerShell scripts with execution delay.

Initial section of powershell

The script can be successively deobfuscated until a dependent file is revealed, whose name change in different deployments.

Extract of payload used during the infection chain

About RansomHub

RansomHub is a Ransomware-as-a-Service (RaaS) group emerged in 2024, although its code has been linked to the code of Knight ransomware (for sale on underground forums in February 2024), according to Symantec researchers.

This RaaS group made headlines after BlackCat affiliates, who had previously involved in the attack on Change Healthcare, targeted the organization again, this time with RansomHub. Therefore, this group has been seen as an alternative to other groups whose popularity may have been negatively affected in recent months.

During the month of June, RansomHub has been one of the ransomware groups with the most impact globally, according to public sources processed by Lab52. The next graph shows the approximate number of victims by month.

Ransiomware victims – Worldwide

The impact of RansomHub in Latin America was documented in the latest ransomware report for Q1 2024 conducted by the Lab52 (S2 Grupo) team. In this case, during the last quarter this group reaches the second position mong the groups with the greatest impact in the region.

Ransomware victims – Latin America

Considering Europe, this group reaches during june the fourth position in June, and was the group with the highest number of known victims.

Ransomware victims – Europe

Therefore, both globally and regionally, it is evident that the impact of this group has increased during the last quarter and could continue to rise. However, this will also depend largely on the deployment tactics employed by the actors behind the ransomware and the capabilities of the ransomware itself to facilitate achieving their goals.

Tactics, Techniques and Procedures (TTP)

  • T1190 Exploit Public-Facing Application
  • T1133 External Remote Services
  • T1016 System Network Configuration Discovery
  • T1082 System Information Discovery
  • T1588.006 Vulnerabilities
  • 1057 Process Discovery
  • T1562.009 Safe Mode Boot
  • T1562 Impair Defenses
  • T1018 Remote System Discovery
  • T1105 Ingress Tool Transfer
  • T1562.001 Disable or Modify Tools
  • T1219 Remote Access Software
  • T1090 Proxy
  • T1560.001 Archive via Utility
  • T1041 Exfiltration Over C2 Channel
  • T1587 Develop Capabilities
  • T1587.001 Malware
  • T1486 Data Encrypted for Impact
  • T1657 Financial Theft

Indicators of Compromise (IoC)

Hashes

NameSha256
sample1.exefb78afe826a14d4e0cc883fcdb6fe339e45a3fe728e575137b231aec6418a18f
sample2.exe3dabecacc40e2904beba9372e95cf25cec8bb021c080f5d892fbf2eeb0e97006

nieto

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related

Ransomware’s Christmas Carol
December 21, 2023
Tags: RaaS, ransomware
Analyzing the encryption method of emerging ransomware families
November 29, 2022
Tags: AXLocker, Decryption, ransomware
Quick review of Babuk ransomware builder
July 05, 2021
Tags: babuk, builder, ransomware

Footer

Copyright &copy Lab52 2019 by S2 Grupo | Legal notice | Cookie policy | Privacy policy