IOCs:
- 86.106.93.230 – datsonsdaughter.com – Good Man gate
- 109.234.37.212 – see.letsown.com – RIG EK
- 34.207.223.86 – mbfce24rgn65bx3g.2kzm0f.com – POST requests to C2
- 34.207.223.86 – 7gie6ffnkrjykggd.2kzm0f.com – SAGE Decryption site
- 34.207.223.86 – 7gie6ffnkrjykggd.6t4u2p.net – SAGE Decryption site
- 34.207.223.86 – 7gie6ffnkrjykggd.jpo2z1.net – SAGE Decryption site
- Tor Browser – 7gie6ffnkrjykggd.onion/login/[personal key]
Traffic:
Hashes:
SHA256: d5ee007a06cc4b8c0100ed4950a4350c0e8e4ad17fe5417de2c2231f48a6021f
File name: RIG EK Flash Exploit.swf
SHA256: 7c2bb48d35bf04bd4cee636d30ca096e194b741f68bced750310fe8a58eda54f
File name: o32.tmp
SHA256: 01fd9a6245c93f25ec2202d06bb40dbdcb5a3c1a0e5fb3db54c4d6253f9f7f4c
File name: udxmr3hn.exe
Hybrid-Analysis Report
https://www.hybrid-analysis.com/sample/01fd9a6245c93f25ec2202d06bb40dbdcb5a3c1a0e5fb3db54c4d6253f9f7f4c?environmentId=100
Infection Chain:
This infection started off with me visiting a Good Man gate. For those of you who don’t know what that is you can read more about that HERE. The gate domain for this infection chain was datsonsdaughter[.]com. It contained an iframe that redirected the host to a RIG EK landing page at see.letsown.com.
You can tell by the traffic that the gate domain kept refreshing over and over again. This caused multiple GET requests for the gate, landing page, Flash exploit, and SAGE ransomware payload. Eventually I had to close IE to prevent the page from refreshing.
Once on the landing page we see o32.tmp dropped and executed in %Temp%:
The script downloads the payload which is dropped and executed in %Temp%:
The payload is copied to AppData:
Processes:
- Schedules a task via schtasks.exe to be executed at a specific time and date
- Deletes volume snapshots via vssadmin.exe delete shadows /all /quiet command (often used by Ransomware)
- Disables startup repair
- Tries to suppress failures during boot (often used to hide system changes)
- Executes a VBScript via process wscript.exe with commandline “%Temp%f1.vbs”
The malware created .bat files in %Temp%. Each file has similar instructions:
The Desktop background is changed to the ransom note via a .bmp image found in %Temp%:
Encrypted files are appended with a .sage extension. An image of a lock is also used by the ransomware to signify that the file is encrypted:
Trying to open an encrypted file prompts the user with some instructions:
The ransom notes are called !HELP_SOS.hta. Users are pointed to three different domains hosted on various TLDs and an optional .onion domain for users needing to use the Tor browser/network.
Below are some images of the user login page and the decrypter page:
I’m attaching the .bmp image used on the Desktop and the .hta ransom note below:
Sorry for the late post on this infection. I was sick most of the week. Until next time!
any chance of a decryption tool in the near future?
LikeLike
Not sure. I would check the links found here https://malwarebreakdown.com/help/ransomware/
LikeLike