{"id":1581,"date":"2022-11-29T11:02:14","date_gmt":"2022-11-29T10:02:14","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=1581"},"modified":"2022-11-29T11:05:14","modified_gmt":"2022-11-29T10:05:14","slug":"analyzing-the-encryption-method-of-emerging-ransomware-families","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/analyzing-the-encryption-method-of-emerging-ransomware-families\/","title":{"rendered":"Analyzing the encryption method of emerging ransomware families"},"content":{"rendered":"\n<p>Cyble has recently published an <a href=\"https:\/\/blog.cyble.com\/2022\/11\/18\/axlocker-octocrypt-and-alice-leading-a-new-wave-of-ransomware-campaigns\/\">analysis of AXLocker ransomware<\/a>, a new ransomware that has been seen for the first time in november this month.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"185\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-30-1024x185.png\" alt=\"\" class=\"wp-image-1650\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-30-1024x185.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-30-300x54.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-30-768x139.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-30.png 1124w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>As the article explains, the ransomware encrypts and exfiltrates data using discord. In this report we will focus on the encryption routine of this new artifact, which we can see in its &#8220;EncryptionFile&#8221; method.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"658\" height=\"372\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen.png\" alt=\"\" class=\"wp-image-1583\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen.png 658w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-300x170.png 300w\" sizes=\"(max-width: 658px) 100vw, 658px\" \/><\/figure><\/div>\n\n\n\n<p>First, it obtains a string stored in the variable &#8220;password&#8221; (&#8220;WnZr4u7xh60A2W4Rzt&#8221;) which is hashed using the SHA256 algorithm.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>c889bdf9d6ba1d89aa7b99043f2e78d923158ff245b664d247be26840b97bd2a<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"349\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-1.png\" alt=\"\" class=\"wp-image-1584\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-1.png 320w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-1-275x300.png 275w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n\n\n\n<p>Using this password and a &#8220;salt&#8221; initialized to the first 8 bytes, the program derives a 256-bit key that it will use to encrypt the files with AES-256.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"986\" height=\"537\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-2.png\" alt=\"\" class=\"wp-image-1585\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-2.png 986w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-2-300x163.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-2-768x418.png 768w\" sizes=\"(max-width: 986px) 100vw, 986px\" \/><\/figure><\/div>\n\n\n\n<p>When ransomware uses this type of symmetric encryption, it usually generates a random password or &#8220;salt&#8221; that it sends to the C2 before encryption. This way the attackers are the only ones who know the key used for encryption. <\/p>\n\n\n\n<p>Since this is the AES-256 algorithm in CBC mode, it will also require a 128-bit initialization vector (IV) that performs an XOR operation with the first block.Therefore, the key we will derive will be 384 bits (256 bits for the key + 128 bits for the IV).<\/p>\n\n\n\n<p>In this case, since the password and &#8220;salt&#8221; values are static, the same key and IV will always be generated.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table is-style-regular\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\"><strong>Parameter<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Value<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">fe40b8abd47c8537c4eb31b7df43bab36b94e728e546cdddbfb5cbed3c42dd3b<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">f3822d39a4daac3a7e99ebae045a735f<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"387\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-4-1024x387.png\" alt=\"\" class=\"wp-image-1589\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-4-1024x387.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-4-300x113.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-4-768x291.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-4.png 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>To check that it works properly, let&#8217;s perform a small proof of concept. For the test, we are going to use the following file &#8220;test.txt&#8221;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"610\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-5.png\" alt=\"\" class=\"wp-image-1595\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-5.png 491w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-5-241x300.png 241w\" sizes=\"(max-width: 491px) 100vw, 491px\" \/><\/figure><\/div>\n\n\n\n<p>When the ransomware is executed, the content of the file looks like this.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"490\" height=\"235\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-11.png\" alt=\"\" class=\"wp-image-1603\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-11.png 490w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-11-300x144.png 300w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"538\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-10.png\" alt=\"\" class=\"wp-image-1602\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-10.png 612w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-10-300x264.png 300w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/figure><\/div>\n\n\n\n<p>Finally, if we use the above key and IV, we can easily decrypt the file.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-12-1024x546.png\" alt=\"\" class=\"wp-image-1604\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-12-1024x546.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-12-300x160.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-12-768x410.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-12.png 1483w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Performing an active search in public sources, we have found several .NET samples that use the same &#8220;insecure&#8221; encryption method. These samples belong to the following ransomware families:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\"><strong>Ransomware Families<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">A.E.S.R.T<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Clownic<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">ElevateRansom<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">CBTL<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">GetFu**ed<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">SLAM<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Comparing the samples we noticed that GetF**ed and Clownic share an identical &#8220;Main()&#8221; function. Which is quite similar to the AXLocker main function.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"373\" height=\"112\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-20.png\" alt=\"\" class=\"wp-image-1627\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-20.png 373w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-20-300x90.png 300w\" sizes=\"(max-width: 373px) 100vw, 373px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"489\" height=\"139\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-15.png\" alt=\"\" class=\"wp-image-1619\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-15.png 489w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-15-300x85.png 300w\" sizes=\"(max-width: 489px) 100vw, 489px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"145\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-16.png\" alt=\"\" class=\"wp-image-1620\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-16.png 491w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-16-300x89.png 300w\" sizes=\"(max-width: 491px) 100vw, 491px\" \/><\/figure><\/div>\n\n\n\n<p>This &#8220;Main()&#8221; matches the main function of <a href=\"https:\/\/github.com\/goliate\/hidden-tear\" data-type=\"URL\" data-id=\"https:\/\/github.com\/goliate\/hidden-tear\">hiden-tear<\/a>, the first ransomware that was released as open-source in August 2015 by Uktu Sen. The code is publicly available on github and can be easily modified.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"567\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-17-1024x567.png\" alt=\"\" class=\"wp-image-1621\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-17-1024x567.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-17-300x166.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-17-768x425.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-17-400x222.png 400w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-17.png 1240w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Hiden-tear has specific functions to create a random password and send it to a C2 controlled by the attacker. However, these families do not seem to have the necessary infrastructure to be able to implement this and have opted to leave the password hardcoded in the binary.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"397\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-18.png\" alt=\"\" class=\"wp-image-1622\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-18.png 725w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-18-300x164.png 300w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><\/figure><\/div>\n\n\n\n<p>On the other hand, ElevateRansom, A.E.S.R.T, SLAM and CBTL share very similar &#8220;Start()&#8221; functions that perform almost the same functions.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"566\" height=\"174\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-21.png\" alt=\"\" class=\"wp-image-1628\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-21.png 566w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-21-300x92.png 300w\" sizes=\"(max-width: 566px) 100vw, 566px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"178\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-22.png\" alt=\"\" class=\"wp-image-1629\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-22.png 571w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-22-300x94.png 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-23.png\" alt=\"\" class=\"wp-image-1630\" width=\"567\" height=\"199\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-23.png 567w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-23-300x105.png 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"556\" height=\"184\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-29.png\" alt=\"\" class=\"wp-image-1647\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-29.png 556w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-29-300x99.png 300w\" sizes=\"(max-width: 556px) 100vw, 556px\" \/><\/figure><\/div>\n\n\n\n<p>These ransomwares have more capabilities than the previous ones by deleting shadow copies, the backup catalog and disabling the widows security mode. These capabilities match those provided by the <a href=\"https:\/\/medium.com\/s2wblog\/anatomy-of-chaos-ransomware-builder-and-its-origin-feat-open-source-hidden-tear-ransomware-ffd5937d005f\" data-type=\"URL\" data-id=\"https:\/\/medium.com\/s2wblog\/anatomy-of-chaos-ransomware-builder-and-its-origin-feat-open-source-hidden-tear-ransomware-ffd5937d005f\">Chaos builder ransomware <\/a>also based on hiden-tear, so these three groups may have based some of their logic on that builder.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"571\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-24.png\" alt=\"\" class=\"wp-image-1631\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-24.png 845w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-24-300x203.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-24-768x519.png 768w\" sizes=\"(max-width: 845px) 100vw, 845px\" \/><\/figure><\/div>\n\n\n\n<p>Therefore, since all samples are hiden-tear based and none use random password generation it is not difficult to extract the decryption keys from each of the samples.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"563\" height=\"467\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-25.png\" alt=\"\" class=\"wp-image-1633\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-25.png 563w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/imagen-25-300x249.png 300w\" sizes=\"(max-width: 563px) 100vw, 563px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><thead><tr><th class=\"has-text-align-right\" data-align=\"right\"><strong>AXLocker<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>(D9793C24290599662ADC4C9CBA98A192207D9C5A18360F3A642BD9C07EF70D57)<br>(526CD1C6EE4B4982C8A066B0FBB8DD044CBD0AAC0D6C57E3A9BC45B3BCC857BB)<br>(9E95FCF79FAC246EBB5DED254449126B7DD9AB7C26BC3238814EAFB1B61FFD7A)<br>(0225A30270E5361E410453D4FB0501EB759612F6048AD43591B559D835720224)<br>(C8E3C547E22AE37F9EEB37A1EFD28DE2BAE0BFAE67CE3798DA9592F8579D433C)<br>(D51297C4525A9CE3127500059DE3596417D031916EB9A52B737A62FB159F61E0)<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-right\" data-align=\"right\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">fe40b8abd47c8537c4eb31b7df43bab36b94e728e546cdddbfb5cbed3c42dd3b<\/td><\/tr><tr><td class=\"has-text-align-right\" data-align=\"right\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">f3822d39a4daac3a7e99ebae045a735f<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><thead><tr><th class=\"has-text-align-right\" data-align=\"right\"><strong>A.E.S.R.T<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>(D9793C24290599662ADC4C9CBA98A192207D9C5A18360F3A642BD9C07EF70D57)<\/strong><br><strong>(B6743906C49C1C7A36439A46DE9ACA88B6CD40F52AF128B215F808A406A69598)<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-right\" data-align=\"right\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">f2cfbe63e05e75d032907ae1d81be238258b30f6750e670bdc48a514c49d5ad4<\/td><\/tr><tr><td class=\"has-text-align-right\" data-align=\"right\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">cf22c4c22ccdfadee8c04408d9a138d4<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><thead><tr><th class=\"has-text-align-right\" data-align=\"right\"><strong>ElevateRansom<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>(B8B35F465A99F2E8C39A7A52F2AF76F68BD8E779AA0D4E705DCAA2BE595D888E)<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-right\" data-align=\"right\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">b397841165e0d1dff42cd33a6a9b12b1293e5927d446fcc3feb1682e452c8c22<\/td><\/tr><tr><td class=\"has-text-align-right\" data-align=\"right\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">898d4c9ecda3e75bb6774c6c2d310078<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><thead><tr><th class=\"has-text-align-right\" data-align=\"right\"><strong>Clownic<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>(880823DD9DF0CA6047CD829A1031E8A167CCEC0629FDEAC40A097DD555DEBF7C)<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-right\" data-align=\"right\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">891184dd507c7ef5cfac4063de071a61adf2d70be155a12ea7cb818047fe9197<\/td><\/tr><tr><td class=\"has-text-align-right\" data-align=\"right\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">50f6e27b9f5624ca748deef2522ba6c5<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><thead><tr><th class=\"has-text-align-right\" data-align=\"right\"><strong>CBTL<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>(E387A1CC1A8694DC77D325A9ADBC9B6F6650FE50B51896EC06A7030110912879)<br>(ECBA870ABA49FC6CD149409497B911C78CE46BD1CE7C1696F0AD00EE80844F50)<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-right\" data-align=\"right\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">a2dbd73e6ace22288271a3f032717b6d2e7822aefec8b7cf1dfc2b54195a9c20<\/td><\/tr><tr><td class=\"has-text-align-right\" data-align=\"right\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">60a0b9d4b110def1ad008a8eba27cae6<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><thead><tr><th class=\"has-text-align-right\" data-align=\"right\"><strong>GetF**ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>(66120938887B4D13ABEE307E24FE6D05261B21DEDE4170D2FE15011574DB8313)<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-right\" data-align=\"right\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">bd2bd815911fcd889ac1c4bce10ee9edb82196dd0bb10ee4de6c0c3bf0e37e40<\/td><\/tr><tr><td class=\"has-text-align-right\" data-align=\"right\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">2f80ec8edb3884bf3759741351fb9448<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><thead><tr><th class=\"has-text-align-right\" data-align=\"right\"><strong>SLAM<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>(59B922E65C5EEF564A75B278A41B10B437D408C3BCD9D62956A98B932FF22E16)<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-right\" data-align=\"right\">Key<\/td><td class=\"has-text-align-center\" data-align=\"center\">4c42d7dbea281b3b31cfbf33130133f66fd8667ff38abc37f78feff913c8a35b<\/td><\/tr><tr><td class=\"has-text-align-right\" data-align=\"right\">IV<\/td><td class=\"has-text-align-center\" data-align=\"center\">27d78cf02f64a3a607199c490d5e3674<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div>\n\n\n\n<p>As these are emerging groups and relatively new samples, all indications are that the operators behind the ransomware are testing their artifacts. It is interesting to have them located in these early iterations in order to be able to observe their evolution.<\/p>\n\n\n\n<p>Customers with Lab52\u2019s APT intelligence private feed service already have more tools and means of detection for this campaign.<br>In case of having threat hunting service or being client of S2Grupo CERT, this intelligence has already been applied.<\/p>\n\n\n\n<p>If you need more information about Lab52\u2019s private APT intelligence feed service, you can contact us through the<a href=\"https:\/\/lab52.io\/contact\"> following link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyble has recently published an analysis of AXLocker ransomware, a new ransomware that has been seen for the first time in november this month. As the article explains, the ransomware encrypts and exfiltrates data using discord. In this report we will focus on the encryption routine of this new artifact, which we can see in [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":1607,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[54,55,32],"class_list":{"0":"post-1581","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"tag-axlocker","9":"tag-decryption","10":"tag-ransomware","11":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/ransom_image-600x400.png","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2022\/11\/ransom_image-600x400.png","author_info":{"display_name":"Er1c_C","author_link":"https:\/\/lab52.io\/blog\/author\/er1c_c\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/1581"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=1581"}],"version-history":[{"count":41,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/1581\/revisions"}],"predecessor-version":[{"id":1656,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/1581\/revisions\/1656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/1607"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=1581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=1581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=1581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}