Rewterz
Rewterz Threat Advisory – CVE-2020-16947 – Microsoft Outlook Remote Code Execution Vulnerability
October 16, 2020
Rewterz
Rewterz Threat Advisory – CVE-2020-1679 – Juniper Networks Junos OS denial of service
October 19, 2020

Rewterz Threat Alert – RagnarLocker Ransomware – IOCs

Severity

Medium

Analysis Summary

A Ragnar Locker ransomware campaign is seen after months, since it hit the energy giant EDP for $10.9M back in April. Once it successfully encrypts the files of a target system, the threat actor operating the RagnarLocker ransomware threatens the compromised company with data leakage if a ransom amount is not paid. The group threatens: “we will publish this Leak in Huge and famous journals and blogs, also we will notify all your clients, partners and competitors. So it’s depend on you make it confidential or public !” According to the ransom note dropped on the EDP encrypted systems, the attackers were able to steal confidential information on billing, contracts, transactions, clients, and partners. Below is their sample ransom note:

update-1602844842.png

The Ragnar Locker operators target software regularly used by managed service providers to prevent their attack from being detected and blocked. After reconnaissance and pre-deployment stages, the attackers drop a highly targeted ransomware executable that adds specific extension to encrypted files, features an embedded RSA-2048 key, and drops custom ransom notes. The ransom notes include the victim’s company name, a link to the Tor site, and the data leak site with the victim’s published data. Like the last time, the targets of this attack appear to be Portuguese.

Impact

  • System Takeover
  • Files Encryption
  • Confidentiality breach
  • Data exposure

Indicators of Compromise

MD5

  • cf0a78562c103831dfe6eca6bec99cb9
  • e03bb74167a5349f96ff88e5f0ed94f3
  • 61a9b3b5320cb4d06155542a25868194
  • 73cb5a82f9a2913efd3139f25d86d40e

SHA-256

  • 6264e1b62b9fe6662a9fc2a131f316547c9ed0c3684e51423a3e25f09c238d55
  • 390eda84632720eb71c5f1d1c0b05ac280a4f67364745a9491476a6d0d9c113b
  • 828f247bfa33757043c29ef4379109368f5e6263248436fbf9b9240fd3fe2ebf
  • a30bea3ba2c697013bbda0140e5d42dc1d51304055d81eee26d2be7a2d05483d

SHA1

  • 588c10739ef20be93cb8f0b2de90d23027fbf281
  • 7a99c3d4e361c97dc2c27e077c4c55e5c47cbe36
  • 83f117bb1cceff7837933a070c5b917f42539b11
  • 247666c54e346782b4c7822135441154e092a76a

Source IP

  • 94[.]237[.]109[.]49

Remediation

  • Block the threat indicators at their respective controls.
  • Only buy licensed and well reputed products.
  • Keep all software updated to latest versions.
  • Maintain offline backups for files.
  • Minimize internet exposure of critical assets storing confidential data.