{"id":86147,"date":"2018-04-16T12:13:19","date_gmt":"2018-04-16T06:43:19","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86147"},"modified":"2018-04-16T12:18:36","modified_gmt":"2018-04-16T06:48:36","slug":"dharma-ransomware-resurfaces-new-variant","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/dharma-ransomware-resurfaces-new-variant\/","title":{"rendered":"Dharma ransomware resurfaces with a new variant"},"content":{"rendered":"<p>A new variant of the Dharma ransomware (\u2018.arrow\u2019) has been observed in the wild. This variant appends the extension \u2018<strong>.arrow\u2019<\/strong> to the files it encrypts and spreads via spam emails.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>How Dharma encrypts its victim\u2019s files<\/strong><\/p>\n<p>Once executed, the \u2018.arrow\u2019 variant of Dharma uses the below command to disable Windows\u2019 <strong>repair and backup<\/strong> option using vssadmin.exe.<\/p>\n<p>C:\\Windows\\system32\\vssadmin.exe, vssadmin delete shadows \/all \/quiet<\/p>\n<p>It creates the below process using mode.com which is a genuine process of Windows.<\/p>\n<p>C:\\Windows\\system32\\mode.com, mode\u00a0 con cp select=1251<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86148 alignleft\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/04\/1.jpg\" alt=\"\" width=\"191\" height=\"63\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The actual use of mode.com is after the restart of the computer. It turns the settings of the communications port (COM port) to the default.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86149\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/04\/2.jpg\" alt=\"\" width=\"1294\" height=\"230\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/2.jpg 1294w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/2-300x53.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/2-768x137.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/2-650x116.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/2-789x140.jpg 789w\" sizes=\"(max-width: 1294px) 100vw, 1294px\" \/><\/p>\n<p style=\"text-align: center\">Fig. 1 Command to delete the backup files.<\/p>\n<p>&nbsp;<\/p>\n<p>After execution of the above commands, Dharma starts its encryption activity. During our analysis, we found that that the ransomware basically encrypts both PE and Non-PE files and the extensions which it successfully encrypts while generating the scenario are as follows.<\/p>\n<blockquote><p>\u201cPNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRFEncodedFiles .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJR.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG\u201d<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>The dropped infection marker files and encrypted files have the following pattern.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86150\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/04\/3.jpg\" alt=\"\" width=\"775\" height=\"459\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/3.jpg 775w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/3-300x178.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/3-768x455.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/3-650x385.jpg 650w\" sizes=\"(max-width: 775px) 100vw, 775px\" \/><\/p>\n<p style=\"text-align: center\">Fig. 2 Encrypted files pattern.<\/p>\n<p>From the dropped infection marker files, .hta and .txt file have ransom note.<\/p>\n<p><strong>Dharma\u2019s ransom note<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86151\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/04\/4.jpg\" alt=\"\" width=\"1049\" height=\"764\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/4.jpg 1049w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/4-300x218.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/4-768x559.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/4-535x390.jpg 535w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/4-789x575.jpg 789w\" sizes=\"(max-width: 1049px) 100vw, 1049px\" \/><\/p>\n<p style=\"text-align: center\">Fig. 3 Ransom note<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86152\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/04\/5.png\" alt=\"\" width=\"618\" height=\"284\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/5.png 448w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/5-300x138.png 300w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/p>\n<p style=\"text-align: center\">Fig. 4 Ransom note<\/p>\n<p><strong>Quick Heal proactively protects its users from the \u2018.arrow\u2019 variant of Dharma ransomware with its behavior-based and static detection features.<\/strong><\/p>\n<p><strong>\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86153\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/04\/6.jpg\" alt=\"\" width=\"458\" height=\"265\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/6.jpg 458w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/04\/6-300x174.jpg 300w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/><\/strong><\/p>\n<p style=\"text-align: center\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fig. 5 Behavior Detection<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86154\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/04\/7.jpg\" alt=\"\" width=\"459\" height=\"255\" \/><\/p>\n<p style=\"text-align: center\"><strong>\u00a0<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fig. 6 Static detection.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>How to stay away from ransomware<\/strong><\/p>\n<ul>\n<li>Use a multi-layered antivirus that can stop real-time threats.<\/li>\n<li>Keep your antivirus up-to-date.<\/li>\n<li>Update your Operating System regularly as critical patches are released every day.<\/li>\n<li>Keep your software up-to-date.<\/li>\n<li>Never directly connect remote systems to the Internet.<\/li>\n<li>Do not click on links or download attachments in emails received from unknown sources.<\/li>\n<li>Take regular data backup and keep it in a secure location.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Indicator of Compromise<\/strong><\/p>\n<ul>\n<li>MD5: &#8211; d07bc4924a0b84f4f36871b47eed0593<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Subject matter experts<\/strong><\/p>\n<p>Priyanka Dhasade, Shalaka Patil, Shashikala Halagond | Quick Heal Security Labs<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new variant of the Dharma ransomware (\u2018.arrow\u2019) has been observed in the wild. This variant appends the extension \u2018.arrow\u2019 to the files it encrypts and spreads via spam emails. &nbsp; How Dharma encrypts its victim\u2019s files Once executed, the \u2018.arrow\u2019 variant of Dharma uses the below command to disable Windows\u2019 repair and backup option [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":86158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-86147","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86147"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86147"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86147\/revisions"}],"predecessor-version":[{"id":86157,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86147\/revisions\/86157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86158"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}