Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Rough summary of developing BadRabbit info
- ------------------------------------------
- BadRabbit is locally-self-propagating ransomware (ransom: 0.05 BTC), spreading via SMB once inside.
- Requires user interaction.
- Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Bulgaria, Montenegro ...)
- Not globally self-propagating, but could be inflicted on selected targets on purpose.
- Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below).
- Initial infection:
- Poses as fake Flash update.
- https://twitter.com/jiriatvirlab/status/922835700873158661/photo/1
- https://twitter.com/darienhuss/status/922847966767042561
- Watering-hole-style / drive-by likely, but may also be selectively targeted.
- Beaumont (GossiTheDog) suspects supply-chain tampering or injection (it appears to be self-limiting w/shutdown, etc.)
- Targets/victims
- Mostly affecting .ru/.ua so far. Media outlets, transportation, gov may have been early targets.
- Watering holes in Germany, Turkey, Bulgaria, Montenegro.
- Avast says also Poland and South Korea?
- Avast says some US have been detected, but no details yet; McAfee says no US detected yet
- https://twitter.com/avast_antivirus/status/922941896439291904
- https://twitter.com/SteveD3/status/922964771967848449
- Map (indirectly sourced from Avast PR?)
- https://twitter.com/Bing_Chris/status/922932810725326848
- List of targeted file extensions:
- Image Tweet: https://twitter.com/craiu/status/922877184494260227
- Text: https://pastebin.com/CwZfyY2F
- Components and methods:
- Using legit signed DiskCryptor binary to encrypt.
- Creates scheduled task to reboot the target system.
- May be using EternalBlue (or at least triggers controls that are watching for its use?), Unit 42 sees no sign of this
- Incorporates stripped-down Mimikatz to discover credentials for propagation.
- https://twitter.com/gentilkiwi/status/922945304172875778
- Overwrites MBR to deliver ransom message.
- Ransom message directs users to Tor-based (.onion) site
- Gives a "please turn off antivirus" user message in some circumstances.
- Also spreads via SMB and WebDAV - locally self-propagating
- https://twitter.com/GossiTheDog/status/922875805033730048
- Also uses this hard-coded list of creds:
- https://pastebin.com/01C05L0C
- https://twitter.com/MaartenVDantzig/status/922854232176422912
- C:\WINDOWS\cscc.dat == DiskCryptor (block execution to inoculate?)
- https://www.virustotal.com/#/file/682adcb55fe4649f7b22505a54a9dbc454b4090fc2bb84af7db5b0908f3b7806/details
- C:\Windows\infpub.dat == #BADRABBIT pushed laterally (block execution to inoculate?)
- Creating a read-only version of this file may halt infection; more below
- https://twitter.com/0xAmit/status/922886907796819968
- Analysis of flash_install.php component
- https://www.hybrid-analysis.com/sample/630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da?environmentId=100
- Video of action:
- https://twitter.com/GossiTheDog/status/922858264534142976
- Apparently clears Windows logs and the filesystem journal, per ESET
- May incorporate copy-and-pasted Microsoft cert/signing?
- https://twitter.com/gN3mes1s/status/922907460842721281
- @mattifestation PS script to search for other use:
- https://gist.github.com/mattifestation/f76c64e87daa40f0d740cb037e575e96
- https://gist.github.com/mattifestation/225c9b4e38b5d11a488bf5c1ccda99cb
- Also installs a keylogger? [source?]
- (The Register mentions this third-hand)
- Wipes boot sector and puts kernel at the end of the drive?
- C&C and payload domains were set up well in advance:
- https://twitter.com/mrjohnkelly73/status/922899328636735488
- https://twitter.com/craiu/status/922911496497238021
- Unlike NetPetya, confirmed to be decrypt-ready:
- https://twitter.com/antonivanovm/status/922944062935707648 (Kaspersky)
- 13% code reuse of notpeyta
- https://analyze.intezer.com/#/analyses/d41e8a98-a106-4b4f-9b7c-fd9e2c80ca7d
- May be a variant of Diskcoder, per ESET
- LIVE SAMPLE (see tweet for password, use at your own risk):
- https://twitter.com/gentilkiwi/status/922944766161154053
- Still contains link to external debugging symbols file (.pdb) [can this be manipulated?] (@malwareunicorn):
- https://twitter.com/malwareunicorn/status/923009391770533888
- Pop-culture references contained:
- Game of Thrones dragons (Drogon, Rhaegal)
- Hackers movie (bottom of list of hard-coded passwords)
- Detection:
- Yara rule (from a McAfee lead engineer)
- https://pastebin.com/Y7pJv3tK
- IOCs (via ESET)
- 79116fe99f2b421c52ef64097f0f39b815b20907 infopub.dat Win32/Diskcoder.D Diskcoder
- afeee8b4acff87bc469a6f0364a81ae5d60a2add dispci.exe Win32/Diskcoder.D Lockscreen
- 413eba3973a15c1a6429d9f170f3e8287f98c21c Win32/RiskWare.Mimikatz.X Mimikatz (32-bits)
- 16605a4a29a101208457c47ebfde788487be788d Win64/Riskware.Mimikatz.X Mimikatz (64-bits)
- de5c8d858e6e41da715dca1c019df0bfb92d32c0 install_flash_player.exe Win32/Diskcoder.D Dropper
- 4f61e154230a64902ae035434690bf2b96b4e018 page-main.js JS/Agent.NWC JavaScript on compromised sites
- fbbdc39af1139aebba4da004475e8839
- b14d8faf7f0cbcfad051cefe5f39645f
- caforssztxqzf2nm[.]onion
- 1dnscontrol[.]com/flash_install.php
- 1dnscontrol[.]com/install_flash_player.exe
- 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
- Defense
- (via @GossitheDog):
- * block inbound SMB
- * use Credential Guard in Windows
- * control # of admins
- * monitor scheduled tasks and service creation
- Vaccination: https://twitter.com/0xAmit/status/922911491694694401
- ** Create the following files c:\windows\infpub.dat && c:\windows\cscc.dat
- ** remove ALL PERMISSIONS (inheritance) and you are now vaccinated. :)
- Other ideas:
- * Disable WMI where feasible
- Money trail
- Bitcoin addresses (h/t: @Steve3D)
- https://blockchain.info/address/1GxXGMoz7HAVwRDZd7ezkKipY4DHLUqzmM
- https://blockchain.info/address/17GhezAiRhgB8DGArZXBkrZBFTGCC9SQ2Z
- Coverage and news
- ESET (very good tech coverage):
- https://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back-improved-ransomware/
- The Register (good tech summary):
- https://www.theregister.co.uk/2017/10/24/badrabbit_ransomware/
- Steve Ragan article (excellent, being updated rapidly)
- https://www.csoonline.com/article/3234691/security/badrabbit-ransomware-attacks-multiple-media-outlets.html
- Watch @GossiTheDog on Twitter for updates.
- https://twitter.com/GossiTheDog
- Palo Alto analysis (Unit 42):
- https://researchcenter.paloaltonetworks.com/2017/10/threat-brief-information-bad-rabbit-ransomware-attacks/
- ... and Palo Alto protections:
- https://researchcenter.paloaltonetworks.com/2017/10/palo-alto-networks-protections-bad-rabbit-ransomware-attacks/
- Group-IB (first to alert/discover):
- https://www.group-ib.com/blog/badrabbit
- Microsoft malware entry
- https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom:Win32/Tibbar.A
- Kaspersky:
- https://www.kaspersky.com/blog/bad-rabbit-ransomware/19887/
- https://securelist.com/bad-rabbit-ransomware/82851/
- McAfee:
- https://securingtomorrow.mcafee.com/mcafee-labs/badrabbit-ransomware-burrows-russia-ukraine/
- Cisco/Talos:
- http://blog.talosintelligence.com/2017/10/bad-rabbit.html
- Motherboard article:
- https://motherboard.vice.com/en_us/article/59yb4q/bad-rabbit-petya-ransomware-russia-ukraine
- BleepingComputer article:
- https://www.bleepingcomputer.com/news/security/bad-rabbit-ransomware-outbreak-hits-eastern-europe/
- AlienVault matrix:
- https://otx.alienvault.com/pulse/59ef5e053db003162704fcb2/
- US-CERT notice:
- https://www.us-cert.gov/ncas/current-activity/2017/10/24/Multiple-Ransomware-Infections-Reported
- Threatpost:
- https://threatpost.com/badrabbit-ransomware-attacks-hitting-russia-ukraine/128593/
- The Hacker News:
- https://thehackernews.com/2017/10/bad-rabbit-ransomware-attack.html
- PC Magazine:
- https://www.pcmag.com/news/356977/badrabbit-ransomware-targets-systems-in-russia-ukraine
- Cybereason (vaccine approach):
- https://www.cybereason.com/blog/cybereason-researcher-discovers-vaccine-for-badrabbit-ransomware
- MIT Technology Review:
- https://www.technologyreview.com/the-download/609206/a-new-strain-of-ransomware-is-hitting-eastern-europe/
- Malwarebytes (@hasherezade)
- https://blog.malwarebytes.com/threat-analysis/2017/10/badrabbit-closer-look-new-version-petyanotpetya/
- Qualys:
- https://threatprotect.qualys.com/2017/10/24/bad-rabbit-ransomware/
- https://blog.qualys.com/news/2017/10/24/bad-rabbit-ransomware
- Hackplayers (Spanish - in fact, it looks like they translated an earlier version of my document!)
- http://www.hackplayers.com/2017/10/badrabbit-que-es-lo-que-hay-que-saber-de-momento.html
Advertisement
Add Comment
Please, Sign In to add comment