{"id":85822,"date":"2018-02-19T22:35:19","date_gmt":"2018-02-19T17:05:19","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85822"},"modified":"2018-02-19T22:35:19","modified_gmt":"2018-02-19T17:05:19","slug":"new-saturn-ransomware-offers-ransomware-service","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/new-saturn-ransomware-offers-ransomware-service\/","title":{"rendered":"New Saturn Ransomware offers ransomware-as-a-service"},"content":{"rendered":"<p>Quick Heal Security Labs has come across a new ransomware called \u2018Saturn\u2019 currently doing the rounds which upon encryption appends \u201c. Saturn\u201d extension to the encrypted files.<\/p>\n<p><strong>\u00a0<\/strong><strong>Behaviour of Saturn Ransomware<\/strong><\/p>\n<p>Upon arrival on the host machine, Saturn ransomware checks whether it is a virtual environment or has any debuggers. If these checks are satisfied, it will not execute. It also checks whether the current system user is an administrator or not.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85823 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/1.png\" alt=\"\" width=\"736\" height=\"222\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/1.png 736w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/1-300x90.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/1-650x196.png 650w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig 1. Snippet showing anti-debugger check.<\/p>\n<p>After successful execution, Saturn fires the below command to disable Windows <strong>repair and backup<\/strong> option using Vssadmin.exe. Vssadmin.exe is used to create and manage shadow volume copies on the drive.<\/p>\n<ol>\n<li>&#8220;C:\\Windows\\System32\\cmd.exe&#8221; \/C vssadmin.exe delete shadows \/all \/quiet &amp; wmic.exe shadowcopy delete &amp; bcdedit \/set {default} bootstatuspolicy ignoreallfailures &amp; bcdedit \/set {default} recoveryenabled no &amp; wbadmin delete catalog\u201d<\/li>\n<li>\u201cC:\\Windows\\system32\\vssadmin.exe, vssadmin.exe delete shadows \/all \/quiet \u201c<\/li>\n<\/ol>\n<p>After executing the above commands, Saturn starts its encryption activity. Our analysis says that ransomware basically encrypts Non-PE files and below are the extensions which it successfully encrypted while generating the scenario.<\/p>\n<p>\u2018txt,pptx, ppt, csv, docm,wpd, wps, text, dif, xls, doc, xlsx, xlsm, docx, rtf, xml,pdf, cdr, 1cd, sqlite, wav, mp3,mid, mpa, obj, max, 3dm, 3ds, dbf, accdb, sql, pdb, mdb, wsf, apk, com, gadget, torrent, jpg, jpeg, tiff, tif, png, bmp, mp4, mov, gif, avi, wmv,ico, zip, rar, tar, backup, bak, json, php, cpp, asm, bat, vbs, class, java, jar, asp, lib,crt,pl, pem, vmx, vmdk, vdi, vbox,dat,cfg, config\u2019.<\/p>\n<p>Saturn drops infection marker files and encrypted files has the following pattern.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85824 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/2.png\" alt=\"\" width=\"433\" height=\"324\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/2.png 433w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/2-300x224.png 300w\" sizes=\"(max-width: 433px) 100vw, 433px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 Fig.2<\/p>\n<p>From the dropped infection marker files,\u2019.html,.txt and.BMP\u2019 have the ransom note whereas \u2018.vbs\u2019 has the voice notification alert.<\/p>\n<p><strong>Saturn drops the following ransom notes<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-85826\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/3_.jpg\" alt=\"\" width=\"633\" height=\"333\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/3_.jpg 1491w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/3_-300x158.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/3_-768x404.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/3_-650x342.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/3_-789x415.jpg 789w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 \u00a0Fig 3<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-85827\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/4.png\" alt=\"\" width=\"628\" height=\"343\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/4.png 439w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/4-300x164.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 Fig 4<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-85828\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/5.png\" alt=\"\" width=\"624\" height=\"351\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/5.png 480w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/5-300x169.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig 5<\/p>\n<p>In order to pay the ransom, the user needs to visit the website \u201chttps:\/\/su34pwhpcafeiztt.onion\u201d using a Tor network where it asks for a decryption key and a captcha.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-85829\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/6.png\" alt=\"\" width=\"331\" height=\"271\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/6.png 335w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/6-300x246.png 300w\" sizes=\"(max-width: 331px) 100vw, 331px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig 6<\/p>\n<p>When you log in, it displays the below page which contains the ransom to be paid and the time remaining to pay the ransom. If the ransom is not paid, after a week, the user must pay twice the previous ransom amount.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-85830\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/7.png\" alt=\"\" width=\"630\" height=\"319\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/7.png 569w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/7-300x152.png 300w\" sizes=\"(max-width: 630px) 100vw, 630px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 Fig 7<\/p>\n<p><strong>Ransomware-as-a-Service<\/strong><\/p>\n<p>Saturn usually spreads through spam emails and malicious advertisements. Recently, it has started its own propagation technique named \u201cRaaS: Ransomware- as-a-service\u201d.<\/p>\n<p>In this technique, it lets users create a new Saturn ransomware stub. This stub can be embedded into PE or non-PE files. The propagator of this new ransomware will get 70% of the ransom money and the remaining 30% will be rewarded to the creator.<\/p>\n<p><strong>How Quick Heal protects its users from the Saturn ransomware<\/strong><\/p>\n<p>Apart from the static detection, <a href=\"https:\/\/bit.ly\/2ncPU26\">Quick Heal\u2019s Behaviour Detection<\/a> and Anti-Ransomware successfully eliminate this threat.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-85831 alignleft\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/8.png\" alt=\"\" width=\"334\" height=\"192\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/8.png 322w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/8-300x172.png 300w\" sizes=\"(max-width: 334px) 100vw, 334px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-85832\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/9.png\" alt=\"\" width=\"359\" height=\"193\" \/><\/p>\n<p>fig 8\u00a0 Anti Ransomware\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0fig 9\u00a0Behaviour Detection<\/p>\n<p>&nbsp;<\/p>\n<p><strong>How to stay away from ransomware<\/strong><\/p>\n<ul>\n<li>Use a multi-layered antivirus in your system which will protect you from real-time threats.<\/li>\n<li>Keep your antivirus up-to-date.<\/li>\n<li>Update your Operating System regularly as critical patches are released almost every day.<\/li>\n<li>Keep your software up-to-date. Older and outdated versions of software have vulnerabilities which are almost always exploited by attackers to infect a system with ransomware and other malware.<\/li>\n<li>Never directly connect remote systems to the Internet. Always use a VPN (Virtual Remote Network) to access a network remotely.<\/li>\n<li>Do not click on links or download attachments in emails received from unexpected or unknown sources.<\/li>\n<li>Take regular data backup and keep it in a secure location.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Subject Matter Experts<\/strong><\/p>\n<p>Shalaka Patil, Priyanka Dhasade, Shashikala Halagond , Shriram Munde| Quick Heal Security Labs<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Security Labs has come across a new ransomware called \u2018Saturn\u2019 currently doing the rounds which upon encryption appends \u201c. Saturn\u201d extension to the encrypted files. \u00a0Behaviour of Saturn Ransomware Upon arrival on the host machine, Saturn ransomware checks whether it is a virtual environment or has any debuggers. If these checks are satisfied, [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":85843,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-85822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85822"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85822"}],"version-history":[{"count":10,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85822\/revisions"}],"predecessor-version":[{"id":85842,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85822\/revisions\/85842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85843"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}