{"id":85918,"date":"2018-03-06T17:19:53","date_gmt":"2018-03-06T11:49:53","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85918"},"modified":"2018-03-06T17:33:12","modified_gmt":"2018-03-06T12:03:12","slug":"beware-new-net-ransomware-encrypting-files-lime","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/beware-new-net-ransomware-encrypting-files-lime\/","title":{"rendered":"Beware! A new .Net Ransomware is encrypting files with .Lime"},"content":{"rendered":"<p>Cases of the <strong>\u201cLime ransomware\u201d<\/strong> have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware attacks.<\/p>\n<p>\u2018Lime\u2019 is a newly discovered .net ransomware; it is also known as the \u2018BigEyes\u2019 ransomware. It uses two major ways to infect user\u2019s systems, either spam emails or malicious downloads.<\/p>\n<p>Ransomware usually comes into the system without the user\u2019s knowledge through online activities like software bundling, spam email attachments, infected links, malvertising, by visiting unknown sites, RDP (Remote desktop protocol) and exploit kits.<\/p>\n<p><strong>Infection vector<\/strong><\/p>\n<figure id=\"attachment_85921\" aria-describedby=\"caption-attachment-85921\" style=\"width: 437px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85921\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Lime_Ransomware_attack_chain-437x390.png\" alt=\"\" width=\"437\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Lime_Ransomware_attack_chain-437x390.png 437w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Lime_Ransomware_attack_chain-300x268.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Lime_Ransomware_attack_chain.png 542w\" sizes=\"(max-width: 437px) 100vw, 437px\" \/><figcaption id=\"caption-attachment-85921\" class=\"wp-caption-text\">Fig 1 Lime Ransomware attack chain<\/figcaption><\/figure>\n<p><strong>Technical analysis<\/strong><\/p>\n<p><strong>Encryption<\/strong><strong> Process: in-depth description<\/strong><\/p>\n<p>Lime is a ransomware that encrypts your files and demands Bitcoin as a ransom to get your files restored. Files are locked with the AES-256 encryption algorithm. The Lime ransomware encrypts your files and appends the <strong>\u201c<\/strong><strong>.Lime<\/strong><strong>\u201d<\/strong> extension.<\/p>\n<p>After encryption, the Lime ransomware drops a ransom note Fig 2.<\/p>\n<figure id=\"attachment_85922\" aria-describedby=\"caption-attachment-85922\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85922\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/Ransom_note-650x366.png\" alt=\"\" width=\"650\" height=\"366\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Ransom_note-650x366.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Ransom_note-300x169.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Ransom_note-768x432.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Ransom_note-789x444.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/Ransom_note.png 1280w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85922\" class=\"wp-caption-text\">Fig 2 Ransom note<\/figcaption><\/figure>\n<p>The following e-mail address is used to contact the malware author to decrypt the encrypted files by paying them:<\/p>\n<p><strong><u>\u201cr3vo@protonmail-com\u201d<\/u><\/strong><\/p>\n<p><strong>Key generation<\/strong><\/p>\n<p>When Lime is first launched, it will call RandomString() function which will attempt to generate an AES key. It generates 50 bytes array from input string using a random index with the use of random() function to fetch one character and stores into output string as shown in Fig 3.<\/p>\n<figure id=\"attachment_85929\" aria-describedby=\"caption-attachment-85929\" style=\"width: 611px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-85929\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/random_key_generation.png\" alt=\"\" width=\"611\" height=\"199\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/random_key_generation.png 611w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/random_key_generation-300x98.png 300w\" sizes=\"(max-width: 611px) 100vw, 611px\" \/><figcaption id=\"caption-attachment-85929\" class=\"wp-caption-text\">Fig 3 Random Key Generation code<\/figcaption><\/figure>\n<p>It calculates md5 of generated output string using Computehash() and then it will copy the result into the result array. It will use this result array as an AES key to encrypt the files present on the system.<\/p>\n<figure id=\"attachment_85923\" aria-describedby=\"caption-attachment-85923\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85923\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/AES_Key_Generation_code-650x126.png\" alt=\"\" width=\"650\" height=\"126\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/AES_Key_Generation_code-650x126.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/AES_Key_Generation_code-300x58.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/AES_Key_Generation_code-768x149.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/AES_Key_Generation_code-789x153.png 789w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85923\" class=\"wp-caption-text\">Fig 4 AES Key Generation code<\/figcaption><\/figure>\n<p>It drops output string at path <strong>\u201cC:\\Microsoft\u201d<\/strong> by name <strong>\u201chash\u201d<\/strong>. As we know that AES is symmetric algorithm so the key used for encryption and decryption will be the same. So, the malware author uses this hash file\u2019s MD5 to decrypt the victim\u2019s files when victim pays ransom amount to him.<\/p>\n<p>Lime ransomware encrypts files on specific folder paths using AES-256 in ECB mode to encrypt files. Paths are as per given below:<\/p>\n<ul>\n<li>My Music<\/li>\n<li>My Pictures<\/li>\n<li>My Videos<\/li>\n<li>Desktop<\/li>\n<li>UserProfile<\/li>\n<\/ul>\n<p><strong>Components used in AES<\/strong><\/p>\n<p>Different modes used in AES:-\u00a0 ECB, CBC, CFB, OFB, CTR.<br \/>\nKey:- AES-128(16 Bytes), AES-192(24 Bytes), AES-256(32 Bytes)<br \/>\nIV:- Initialization vector to use for encryption or decryption<\/p>\n<p>It encrypts files using AES-256 (32-byte key length) in ECB (Electronic Code Book) mode. In ECB mode, it doesn&#8217;t require IV (Initialization vector) for the encryption or decryption process.<\/p>\n<p>For all other modes, it uses IV (Initialization vector). IV is optional and when IV is not present then it will be given a default value of all zeroes.<\/p>\n<p><strong>Modification in file extension<\/strong><\/p>\n<p>List of extensions of files which get encrypted by Lime ransomware:<\/p>\n<p>.c, .cpp, .py, .ini, .hiv, .avi, .bmp, .log, .pdf, .zip, .bak, .rtf, .png, .wsf, .wsc, .ws, .vsw, .vst, .vss, .vsmac, .ros, .vbs, .vbe, .vb, .url, .tmp, .shs, .shb, .sct, .scr, .scf, .reg, .pst, .prg, .pif, .pcd, .ops, .mst, .msp, .msi, .msc, .mdz, .mdw, .mdt, .mde, .mdb, .mda, .maw, .mav, .mau, .mat, .mas, .mar, .maq, .mam, .mag, .maf, .mad, .lnk, .ksh, .jse, .js, .its, .isp, .ins, .inf, .hlp, .fxp, .exe, .csh, .crt, .cpl, .com, .cmd, .chm, .cer, .bat, .pdf, .pot, .xlt, .pps, .xlw, .dot, .rtf, .ppt, .xls, .doc, .xml, .htm, .html, .hta, .app, .asp<\/p>\n<p>The extension \u2018.lime\u2019 is placed as a secondary extension, without altering the original names and its extension.<\/p>\n<p>Example:<\/p>\n<p>Original file name\u00a0 :\u00a0 mydemo.cpp<br \/>\nAfter encryption\u00a0\u00a0\u00a0 \u00a0 :\u00a0 mydemo.cpp.Lime<\/p>\n<p><strong>And yes! Recovery of Encrypted File is possible<\/strong><\/p>\n<p>We can decrypt all files which are encrypted by <strong>\u201cLime Ransomware\u201d<\/strong>. The key is 32 bytes which is generated from MD5 of \u201chash\u201d file which is dropped at <strong>\u201cC:\\Microsoft\u201d <\/strong>location of victim\u2019s mchine<strong>. <\/strong>So, the key is different for different victim.<\/p>\n<p>To decrypt files, <strong>AES-256<\/strong> is used in the <strong>ECB<\/strong> mode and key for that will be generated as given below,<\/p>\n<p>If MD5 of hash file is dropped on the victim\u2019s machine: <strong>\u201c05FF78F91FE2D008018A2F53792C0C28\u201d<\/strong><\/p>\n<p>Key generation from MD5<\/p>\n<p>Take 15 bytes from MD5 + Take 16 bytes from MD5 + Append zero=32 bytes key<br \/>\nKey = 05FF78F91FE2D008018A2F53792C0C + 05FF78F91FE2D008018A2F53792C0C28 + 00<br \/>\nKey = <strong>05FF78F91FE2D008018A2F53792C0C05FF78F91FE2D008018A2F53792C0C2800<\/strong><\/p>\n<p><strong>Process killing<\/strong><\/p>\n<p>It checks the presence for specific processes and try to kill these processes. These process names are as follows:<\/p>\n<ul>\n<li><strong>Taskmgr<\/strong><\/li>\n<li><strong>Cmd<\/strong><\/li>\n<li><strong>Bdagent<\/strong><\/li>\n<li><strong>ProcessHacker<\/strong><\/li>\n<\/ul>\n<figure id=\"attachment_85928\" aria-describedby=\"caption-attachment-85928\" style=\"width: 639px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85928\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/03\/process_killing-639x390.png\" alt=\"\" width=\"639\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/process_killing-639x390.png 639w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/process_killing-300x183.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/process_killing-768x469.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/03\/process_killing-789x482.png 789w\" sizes=\"(max-width: 639px) 100vw, 639px\" \/><figcaption id=\"caption-attachment-85928\" class=\"wp-caption-text\">Fig 5 Process killing<\/figcaption><\/figure>\n<p><strong>Indicators of compromise<\/strong><\/p>\n<ol>\n<li>MD5: E1B571F1AD5266156C8233FA0D2BA1E0<\/li>\n<li>C:\\Microsoft\\hash<\/li>\n<li>The extension <strong>\u201c.Lime\u201d<\/strong> is placed as a secondary extension, without altering the original names and its extension.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><strong>Quick Heal protects its users from the Lime ransomware<\/strong><\/p>\n<p><a href=\"https:\/\/bit.ly\/2ncPU26\">Quick Heal<\/a> detected and successfully eliminated this threat using Static Detection and Behavior-based Detection.<\/p>\n<ul>\n<li>Malicious files are detected as \u201cRansom.Lime.S1809905\u201d<\/li>\n<\/ul>\n<p><strong>How to stay away from ransomware<\/strong><\/p>\n<ol>\n<li>Use a multi-layered antivirus in your system which will protect you from real-time threats.<\/li>\n<li>Keep your antivirus up-to-date.<\/li>\n<li>Update your Operating System regularly as critical patches are released almost every day.<\/li>\n<li>Keep your software up-to-date. Older and outdated versions of software have Vulnerabilities which are almost always exploited by attackers to infect a system with ransomware and other malware.<\/li>\n<li>Never directly connect remote systems to the Internet. Always use a VPN (Virtual Remote Network) to access a network remotely.<\/li>\n<li>Do not click on links or download attachments in emails received from unexpected or unknown sources.<\/li>\n<li>Take regular data backup and keep it in a secure location.<\/li>\n<li>Do not open suspicious email attachments.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><strong>Subject Matter Experts<\/strong><\/p>\n<p>Prashant Indalkar, Pandurang Terkar | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cases of the \u201cLime ransomware\u201d have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware attacks. \u2018Lime\u2019 is a newly discovered .net ransomware; it is also known as the \u2018BigEyes\u2019 ransomware. [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":85925,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,910,1],"tags":[],"class_list":["post-85918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-ransomware","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85918"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85918"}],"version-history":[{"count":7,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85918\/revisions"}],"predecessor-version":[{"id":85934,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85918\/revisions\/85934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85925"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}