{"id":86587,"date":"2018-08-08T17:55:38","date_gmt":"2018-08-08T12:25:38","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86587"},"modified":"2018-08-09T12:18:06","modified_gmt":"2018-08-09T06:48:06","slug":"beware-armage-ransomware-file-destroyer","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/beware-armage-ransomware-file-destroyer\/","title":{"rendered":"Beware of the Armage Ransomware &#8211; the File Destroyer!"},"content":{"rendered":"<p>In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends \u2018.Armage\u2019 extension to files it encrypts.<\/p>\n<p>Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files.<\/p>\n<p><strong>Technical analysis<\/strong><\/p>\n<p>Once executed on the infected computer, Armage ransomware opens the command line message narrating the encryption algorithm it has used. See fig 1.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86620\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/1-1.jpg\" alt=\"\" width=\"677\" height=\"342\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-1.jpg 677w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-1-300x152.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/1-1-650x328.jpg 650w\" sizes=\"(max-width: 677px) 100vw, 677px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1. Command line prompt<\/p>\n<p>The ransomware does not drop any artifact to perform the malicious activity or to encrypt data. The entire malicious activity (encryption) is carried out by the mother file itself.<\/p>\n<p>After invading, the ransomware searches for the first file alphabetically to encrypt the data using Windows API FindFirstFileA as shown in fig 2 and to find the next file it has used FindNextFileA API as shown in fig 3.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86622 alignleft\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/2-2.png\" alt=\"\" width=\"1067\" height=\"31\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/2-2.png 1067w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/2-2-300x9.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/2-2-768x22.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/2-2-650x19.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/2-2-789x23.png 789w\" sizes=\"(max-width: 1067px) 100vw, 1067px\" \/><\/p>\n<p style=\"text-align: center\">Fig.2 FindFirstfileA API is used.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86623 alignleft\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/3-2.png\" alt=\"\" width=\"1035\" height=\"29\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/3-2.png 1035w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/3-2-300x8.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/3-2-768x22.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/3-2-650x18.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/3-2-789x22.png 789w\" sizes=\"(max-width: 1035px) 100vw, 1035px\" \/><\/p>\n<p style=\"text-align: center\">Fig 3. FindNextFileA API is used to find the files recursively<\/p>\n<p>After encrypting the data from the folder, Armage drops \u2018Notice.txt\u2019 &#8211; a ransom note mentioning the ransom to be paid with other details. Further, the ransomware drops \u2018Notice.txt\u2019 in all the folders wherever data is encrypted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86624 alignleft\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/4-1.png\" alt=\"\" width=\"1100\" height=\"27\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4-1.png 1100w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4-1-300x7.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4-1-768x19.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4-1-650x16.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/4-1-789x19.png 789w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/><\/p>\n<p style=\"text-align: center\">Fig.4 Code used to create a new file \u2018Notice.txt\u2019<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86625 alignleft\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/5-2.png\" alt=\"\" width=\"1239\" height=\"119\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/5-2.png 1239w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/5-2-300x29.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/5-2-768x74.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/5-2-650x62.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/5-2-789x76.png 789w\" sizes=\"(max-width: 1239px) 100vw, 1239px\" \/><\/p>\n<p style=\"text-align: center\">Fig 5. Code used to show details to the victim<\/p>\n<p>The ransom note also mentions the below.<\/p>\n<p><em>\u2018Your files was encrypted using AES-256 algorithm. Write me to e-mail: armagedosevin@aol.com to get your decryption key.\u2019<\/em><\/p>\n<p>As per the PE file analysis, we have found that ransomware injects itself into the processes that run with the administrative privileges so that it can delete shadow copies using command \u2018vssadmin delete shadows \/all.<\/p>\n<p>This command executes the vssadmin.exe utility and deletes all copies quietly. Fig 5 below shows the code used to delete the shadow copies.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86626 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/6-5.png\" alt=\"\" width=\"849\" height=\"63\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-5.png 849w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-5-300x22.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-5-768x57.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-5-650x48.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/6-5-789x59.png 789w\" sizes=\"(max-width: 849px) 100vw, 849px\" \/><\/p>\n<p style=\"text-align: center\">Fig 6. Code used to delete the shadow copies<\/p>\n<p>Below are the API\u2019s used by ransomware to encrypt the data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86627\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/Api-New.jpg\" alt=\"\" width=\"360\" height=\"201\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Api-New.jpg 360w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Api-New-300x168.jpg 300w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><\/p>\n<p style=\"text-align: center\">Fig 7. API\u2019s used to encrypt the files<\/p>\n<p>The ransomware encrypts all PE and Non-PE files with \u2018.armage\u2019 extension as shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86628\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/7-1.jpg\" alt=\"\" width=\"788\" height=\"440\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-1.jpg 788w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-1-300x168.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-1-768x429.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/7-1-650x363.jpg 650w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/p>\n<p style=\"text-align: center\">Fig 8. Encrypted files with \u2018.armage\u2019 extension<\/p>\n<p><strong>How Quick Heal protects its users from the Armage ransomware<\/strong><\/p>\n<p>Quick Heal successfully blocks Armage with the following multilayered protection layers:<\/p>\n<ul>\n<li>Virus Protection<\/li>\n<li>Behavior-based Detection<\/li>\n<li>Anti-Ransomware<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86630\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/BDS-1.jpg\" alt=\"\" width=\"392\" height=\"205\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/BDS-1.jpg 392w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/BDS-1-300x157.jpg 300w\" sizes=\"(max-width: 392px) 100vw, 392px\" \/><\/p>\n<p style=\"text-align: center\">Fig 9. Behavior detection system blocks the malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-86631\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/9-1.jpg\" alt=\"\" width=\"460\" height=\"264\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/9-1.jpg 460w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/9-1-300x172.jpg 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/p>\n<p style=\"text-align: center\">Fig 10. Anti-Ransomware tool also blocks the malware<\/p>\n<p><strong>How to stay safe from ransomware attacks<\/strong><\/p>\n<ul>\n<li>Always take a backup of your important data in external drives like HDD and pen drives. Consider using a reliable Cloud service to store the data.<\/li>\n<li>Never install any freeware or cracked versions of any software.<\/li>\n<li>Do not open any advertisement pages shown on websites without knowing that they are genuine.<\/li>\n<li>Disable macros while using MS Office.<\/li>\n<li>Update your antivirus to protect your system from unknown threats.<\/li>\n<li>Never click on links or downloads attachments in emails from unexpected, unknown or unwanted sources.<\/li>\n<\/ul>\n<p><strong>Indicators of compromise<\/strong><\/p>\n<ul>\n<li><strong>SHA256 :<\/strong>67697dcd8493f287a880cff6165b903bfe1daf3b55814e90de879cd1fb8df004<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Subject Matter Experts<\/strong><\/p>\n<p>Poonam Dongare, Priyanka Dhasade, Shashikala Halagond, Manish Patil, Shivani Mule | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends \u2018.Armage\u2019 extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the infected computer, Armage ransomware opens [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":86602,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,21,41,133,24,4,303,5,6,1],"tags":[56,163,152,22,23,43,50],"class_list":["post-86587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-email","category-facebook","category-hacker","category-malware","category-news","category-phishing","category-security","category-tips","category-uncategorized","tag-android-security","tag-cyber-crime","tag-cyberespionage","tag-email-malware","tag-fraudulent-email","tag-facebook-malware","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86587"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86587"}],"version-history":[{"count":10,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86587\/revisions"}],"predecessor-version":[{"id":86632,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86587\/revisions\/86632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86602"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}