Executable file details
The executable file “sample.exe” when executed, encrypts all files in the system and creates a new process “uiapp.exe” which displays the ransomware nag(ransom note/message).
Indicators of Compromise
- Drops file uiapp.exe, info.txt, Read-Me-Now.txt
- Drops file uiapp.exe in C:\\ProgramData\uiapp.exe (Hash : ac2c435634b60a4b1c6fa150c88c9d753ec3e1fd1c2a3690d2250416d1783b27)
- Drops info.txt in C:\\ProgramData\info.txt
- Drops file Read-Me-Now.txt
- Connects to the following URL’s
- 176[.]31[.]68[.]30 for ftp, tcp and http
- Passes FTP authentication credential in plaintext
- Traffic containing USER:admin PASS:asmodeusasmodeus to 176[.]31[.]68[.]30 on port 21
The sample executable is a Windows 32-bit PE file compiled by Visual C++.
The file when executed enumerates all drives in the system.
It then retrieves the bitmask representing the currently available disk drives.
The sample file opens all files in each logical drives as binary stream.
It then encrypts all the file contents using a stream cipher which contains permutations and advanced calculus. The analysis of encryption algorithm used will be published in next post.
After encryption the sample drops a ransom note as Read-Me-Now.txt in each directory.
It makes a request to www[.]sfml-dev[.]org/ip-provider[.]php
The response to the above request is the public IP of the victim.
The sample generates a unique key for each infected PC based on ID which is sent to the attacker’s server.
The sample file also downloads and executes another executable from an FTP server at 176[.]31[.]68[.]30 .
The authentication credentials for the ftp server were found to be USER : “admin”, PASS : ”asmodeusasmodeus”.
It downloads the file uiapp.exe to C:\\ProgramData\ .
And executes the downloaded file by creating a new process that runs in the security context of the calling process.
I got the file uiapp.exe quickly from the previously found FTP server.
The file was a .net PE executable file. So, I decompiled the file to see what it does. Looking at the main function we saw it triggered a GUI-application by executing Form1.
The uiapp.exe as indicated by its name is just a UI application to display ransomnote/message on the victim’s desktop and nothing else.
The file sample.exe encrypts all files on the victim’s computer and downloads file uiapp.exe to notify the victim about the compromise.
Stay tuned for more analysis and other amazing stuff. If you love and support my work use the below link to buy me a coffee and help me with my research.