{"id":86646,"date":"2018-08-10T15:05:21","date_gmt":"2018-08-10T09:35:21","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=86646"},"modified":"2018-08-10T15:05:21","modified_gmt":"2018-08-10T09:35:21","slug":"new-net-ransomware-shrug2","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/new-net-ransomware-shrug2\/","title":{"rendered":"Again! A New .NET Ransomware Shrug2"},"content":{"rendered":"<p>For\u00a0several months, Quick Heal Security Labs has been observing an increase in ransomware\u00a0which are\u00a0built in\u00a0 .NET\u00a0framework. Ransomware like <a href=\"https:\/\/blogs.quickheal.com\/runner-key-component-samsam-ransomware-campaign\/\"><u>SamSam<\/u><\/a>, <a href=\"https:\/\/blogs.quickheal.com\/beware-new-net-ransomware-encrypting-files-lime\/\"><u>Lime <\/u><\/a>and now Shrug was found to be built in .NET framework. Malware authors are\u00a0finding it very easy to build and obfuscate malware in .NET framework rather than making them in other compilers.<\/p>\n<p>Quick Heal Security Labs has found a new ransomware named <strong><b>Shrug2<\/b><\/strong>. This ransomware demands a ransom\u00a0of 70$ in the form of Bitcoin for decrypting files.<\/p>\n<p>The infection vector of this ransomware is still unknown, but this file may arrive on the victim\u2019s machine via phishing emails, RDP brute force attacks, malvertising, bundled with other files, etc.<\/p>\n<p><strong><b>Technical Analysis<\/b><\/strong><\/p>\n<p>Before starting file encryption, this ransomware checks for an active Internet connection in an infinite loop by trying to connect to the following\u00a0URL:<\/p>\n<p><em><i>\u201c<\/i><\/em><strong><em><b><i>hxxp<\/i><\/b><\/em><\/strong><strong><em><b><i>:\/\/clients3[.]<\/i><\/b><\/em><\/strong><strong><em><b><i>google<\/i><\/b><\/em><\/strong><strong><em><b><i>[.]com\/generate_204<\/i><\/b><\/em><\/strong><em><i>\u201d<\/i><\/em><\/p>\n<figure id=\"attachment_86647\" aria-describedby=\"caption-attachment-86647\" style=\"width: 352px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86647\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig1_connectivity.png\" alt=\"\" width=\"352\" height=\"145\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig1_connectivity.png 352w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig1_connectivity-300x124.png 300w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/><figcaption id=\"caption-attachment-86647\" class=\"wp-caption-text\">Fig 1: Code to Check Internet Connection<\/figcaption><\/figure>\n<p>If an active Internet connection is found on the victim\u2019s system, it checks whether the system is previously infected with \u201c<strong><b>SHRUG2<\/b><\/strong>\u201d by checking the below registry entry:<\/p>\n<p><em><i>\u201c<\/i><\/em><strong><em><b><i>HKCU\\ShrugTwo<\/i><\/b><\/em><\/strong><em><i>\u201d<\/i><\/em><\/p>\n<figure id=\"attachment_86648\" aria-describedby=\"caption-attachment-86648\" style=\"width: 1072px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86648\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig2_reg_check.png\" alt=\"\" width=\"1072\" height=\"212\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig2_reg_check.png 1072w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig2_reg_check-300x59.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig2_reg_check-768x152.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig2_reg_check-650x129.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig2_reg_check-789x156.png 789w\" sizes=\"(max-width: 1072px) 100vw, 1072px\" \/><figcaption id=\"caption-attachment-86648\" class=\"wp-caption-text\">Fig 2: ShrugTwo Existing Registry Check<\/figcaption><\/figure>\n<p>If the system\u00a0is not infected, then it creates a subkey\u00a0with name \u201c<strong><em><b><i>ShrugTwo<\/i><\/b><\/em><\/strong>\u201d<strong><b>\u00a0<\/b><\/strong>under <strong><b>HKCU <\/b><\/strong>and adds respective values to it as shown in Fig 3.<\/p>\n<p><strong><b>\u00a0<\/b><\/strong><strong><em><b><i>Identifier<\/i><\/b><\/em><\/strong>:\u00a0Generated using Username of logged on user appended with a randomly\u00a0generated number between 10000 to 99999,<\/p>\n<p>Eg. <strong><em><b><i>Username\/25413<\/i><\/b><\/em><\/strong><\/p>\n<p><strong><b>\u00a0<\/b><\/strong><strong><em><b><i>Installdate<\/i><\/b><\/em><\/strong>:\u00a0Date and time when the ransomware infects the\u00a0victim&#8217;s system. This date and time is\u00a0used by the ransomware to display the time left to decrypt\u00a0the files as shown in Fig 15.<\/p>\n<p><strong><b>\u00a0<\/b><\/strong><strong><em><b><i>cryKey<\/i><\/b><\/em><\/strong>: Randomly generated AES256 bit key used to encrypt files.<\/p>\n<p><strong><b>\u00a0<\/b><\/strong><strong><em><b><i>cryIV \u00a0<\/i><\/b><\/em><\/strong>:\u00a0Randomly generated Initialization Vector used to encrypt files.<\/p>\n<figure id=\"attachment_86649\" aria-describedby=\"caption-attachment-86649\" style=\"width: 566px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86649\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig3_unique_id_key_reg.png\" alt=\"\" width=\"566\" height=\"164\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig3_unique_id_key_reg.png 566w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig3_unique_id_key_reg-300x87.png 300w\" sizes=\"(max-width: 566px) 100vw, 566px\" \/><figcaption id=\"caption-attachment-86649\" class=\"wp-caption-text\">Fig 3: Creating ShrugTwo Registry and Adding Values<\/figcaption><\/figure>\n<figure id=\"attachment_86650\" aria-describedby=\"caption-attachment-86650\" style=\"width: 686px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86650\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig4_add_reg_entry.png\" alt=\"\" width=\"686\" height=\"254\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig4_add_reg_entry.png 686w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig4_add_reg_entry-300x111.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig4_add_reg_entry-650x241.png 650w\" sizes=\"(max-width: 686px) 100vw, 686px\" \/><figcaption id=\"caption-attachment-86650\" class=\"wp-caption-text\">Fig 4: ShrugTwo Registry Entry<\/figcaption><\/figure>\n<p>After this, malware executes below command to grant all permissions to directory and sub-directories present in %CD%. This command was also seen to have been used by the WannaCry ransomware.<\/p>\n<p><strong><em><b><i>icacls<\/i><\/b><\/em><\/strong><strong><em><b><i>\u00a0. \/grant Everyone<\/i><\/b><\/em><\/strong><strong><em><b><i>:F<\/i><\/b><\/em><\/strong><strong><em><b><i>\u00a0\/T \/C \/Q<\/i><\/b><\/em><\/strong><\/p>\n<p>As all ransomware do, it also deletes restore points on the victim\u2019s system. For doing this, it doesn\u2019t use\u00a0trivial ransomware restore point deletion, such as<\/p>\n<p>vssadmin delete shadows \/all \/quiet &amp; wmic shadowcopy delete<\/p>\n<p>Rather it uses a very uncommon technique using<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/api\/srrestoreptapi\/nf-srrestoreptapi-srremoverestorepoint\"><u>\u00a0<\/u><strong><em><u><b><i>srclient<\/i><\/b><\/u><\/em><\/strong><strong><em><u><b><i>.SRRemoveRestorePoint<\/i><\/b><\/u><\/em><\/strong><\/a><em><i>\u00a0<\/i><\/em>as shown below:<\/p>\n<figure id=\"attachment_86651\" aria-describedby=\"caption-attachment-86651\" style=\"width: 417px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86651\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/Fig5_deleteRestorePoint.png\" alt=\"\" width=\"417\" height=\"236\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig5_deleteRestorePoint.png 417w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig5_deleteRestorePoint-300x170.png 300w\" sizes=\"(max-width: 417px) 100vw, 417px\" \/><figcaption id=\"caption-attachment-86651\" class=\"wp-caption-text\">Fig 5: System Restore Point Deletion<\/figcaption><\/figure>\n<p>This ransomware encrypts files with around 76 different extensions. The list of extension is as follows:<\/p>\n<p>&#8220;txt, .docx, .xls, .doc, .xlsx, .ppt, .pptx, .odt, .jpg, .png, .jpeg, .csv, .mdb, .db, .sln, \u00a0\u00a0\u00a0\u00a0.html, .php, .asp, .aspx, .html, .xml, .json, .dat, .cpp, .cs, .c, .js, .java, .mp4, .ogg, \u00a0\u00a0\u00a0\u00a0.mp3, .wmv, .avi, .gif, .mpeg, .msi, .rar, .7zip, .z, .apk, .yml, .qml, .py3, .aif, .cda, \u00a0\u00a0\u00a0\u00a0.mpa, .wpl, .mid, .pkg, .deb, .arj, .rpm, .gz, .dbf, .yml, .tar, .pl, .rb, .ico, .tif, .asp, \u00a0\u00a0\u00a0\u00a0.xhtml, .rss, .jsp, .htm, .o, .zip, .midi, .tiff, .tiff, .midi, .zip, .tar.gz, .pyw, .bmp, .sql, \u00a0\u00a0.psd, .7z&#8221;<\/p>\n<p>The ransomware enumerates all files with the above extensions present in C:\\\\ drive only and stores them in a list named \u201c<strong><em><b><i>FilesToHarm<\/i><\/b><\/em><\/strong>\u201d. This list is later used for file encryption.<\/p>\n<figure id=\"attachment_86652\" aria-describedby=\"caption-attachment-86652\" style=\"width: 808px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86652\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/Fig6_filestoharm_snap.png\" alt=\"\" width=\"808\" height=\"75\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig6_filestoharm_snap.png 808w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig6_filestoharm_snap-300x28.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig6_filestoharm_snap-768x71.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig6_filestoharm_snap-650x60.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig6_filestoharm_snap-789x73.png 789w\" sizes=\"(max-width: 808px) 100vw, 808px\" \/><figcaption id=\"caption-attachment-86652\" class=\"wp-caption-text\">Fig 6 : File Enumeration for Encryption<\/figcaption><\/figure>\n<figure id=\"attachment_86653\" aria-describedby=\"caption-attachment-86653\" style=\"width: 426px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86653\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig7_filesToHarm.png\" alt=\"\" width=\"426\" height=\"149\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig7_filesToHarm.png 426w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig7_filesToHarm-300x105.png 300w\" sizes=\"(max-width: 426px) 100vw, 426px\" \/><figcaption id=\"caption-attachment-86653\" class=\"wp-caption-text\">Fig 7: Few Entries in \u201cFilesToHarm\u201d<\/figcaption><\/figure>\n<p>A similar kind of list is also created with the name \u201c<strong><em><b><i>HarmedFiles<\/i><\/b><\/em><\/strong><strong><b>\u201d<\/b><\/strong>\u00a0which contains file paths of encrypted files having the extension\u00a0\u201c.<strong><em><b><i>SHRUG2<\/i><\/b><\/em><\/strong>\u201d, when the demanded ransom amount is paid or time to decrypt files is elapsed. This created list is used for file decryption or deletion.<\/p>\n<figure id=\"attachment_86654\" aria-describedby=\"caption-attachment-86654\" style=\"width: 788px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86654\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig8_enumerate_for_decrypt.png\" alt=\"\" width=\"788\" height=\"279\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig8_enumerate_for_decrypt.png 788w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig8_enumerate_for_decrypt-300x106.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig8_enumerate_for_decrypt-768x272.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig8_enumerate_for_decrypt-650x230.png 650w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><figcaption id=\"caption-attachment-86654\" class=\"wp-caption-text\">Fig 8 : File Enumeration for Decryption<\/figcaption><\/figure>\n<figure id=\"attachment_86655\" aria-describedby=\"caption-attachment-86655\" style=\"width: 482px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86655\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig9_HarmedFiles.png\" alt=\"\" width=\"482\" height=\"164\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig9_HarmedFiles.png 482w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig9_HarmedFiles-300x102.png 300w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><figcaption id=\"caption-attachment-86655\" class=\"wp-caption-text\">Fig 9: Few Entries in \u201cHarmedFiles\u201d<\/figcaption><\/figure>\n<p>This Ransomware uses AES256 algorithm in <a href=\"#Cipher_Block_Chaining_(CBC)\"><u>CBC(Cipher Block Chaining)<\/u><\/a>\u00a0mode for encrypting enumerated files. In this type of mode,\u00a0there is a requirement\u00a0of <strong><em><b><i>Key<\/i><\/b><\/em><\/strong><em><i>\u00a0<\/i><\/em>along with the <strong><em><b><i>Initialization Vector<\/i><\/b><\/em><\/strong><strong><b>(IV)<\/b><\/strong>.<\/p>\n<p><strong><b>\u00a0<\/b><\/strong>The code\u00a0shown in Fig:\u00a010 is used to create below list and randomly selects 32 characters from it which is used as AES 256bit key.<\/p>\n<p><strong><b>\u201c<\/b><\/strong><strong><em><b><i>ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789<\/i><\/b><\/em><\/strong><strong><b>\u201d<\/b><\/strong><\/p>\n<figure id=\"attachment_86656\" aria-describedby=\"caption-attachment-86656\" style=\"width: 569px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86656\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig10_AESkey_generat.png\" alt=\"\" width=\"569\" height=\"423\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig10_AESkey_generat.png 569w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig10_AESkey_generat-300x223.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig10_AESkey_generat-525x390.png 525w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><figcaption id=\"caption-attachment-86656\" class=\"wp-caption-text\">Fig 10: AES Key Generation<\/figcaption><\/figure>\n<p>Similarly,\u00a0code shown in Fig:\u00a011 is used to create below list and randomly selects 16 characters from it which is used as AES 128bit IV.<\/p>\n<p><strong><b>\u201c<\/b><\/strong><strong><em><b><i>ZYXWVUTSRQPONMLKJIHGFEDCBAzyxwvutsrqponmlkjihgfedcba9876543210<\/i><\/b><\/em><\/strong><strong><b>\u201d<\/b><\/strong><\/p>\n<figure id=\"attachment_86657\" aria-describedby=\"caption-attachment-86657\" style=\"width: 550px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86657\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig11_IV_generat.png\" alt=\"\" width=\"550\" height=\"418\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig11_IV_generat.png 550w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig11_IV_generat-300x228.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig11_IV_generat-513x390.png 513w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><figcaption id=\"caption-attachment-86657\" class=\"wp-caption-text\">Fig 11: IV Generation<\/figcaption><\/figure>\n<p>Previously generated Key and IV are used to encrypt file paths present in \u201c<strong><em><b><i>FilesToHarm<\/i><\/b><\/em><\/strong><em><i>\u201d<\/i><\/em><strong><em><b><i>\u00a0<\/i><\/b><\/em><\/strong>list. Ransomware adds \u201c<strong><em><b><i>.SHRUG2<\/i><\/b><\/em><\/strong>\u201d<strong><b>\u00a0<\/b><\/strong>extension<strong><b>\u00a0<\/b><\/strong>to files after encryption.<\/p>\n<figure id=\"attachment_86658\" aria-describedby=\"caption-attachment-86658\" style=\"width: 568px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86658\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig12_encrypt_and_add_extens.png\" alt=\"\" width=\"568\" height=\"395\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig12_encrypt_and_add_extens.png 568w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig12_encrypt_and_add_extens-300x209.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig12_encrypt_and_add_extens-561x390.png 561w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig12_encrypt_and_add_extens-229x158.png 229w\" sizes=\"(max-width: 568px) 100vw, 568px\" \/><figcaption id=\"caption-attachment-86658\" class=\"wp-caption-text\">Fig 12: Encrypt Files and Add Extension<\/figcaption><\/figure>\n<p>To encrypt files, the ransomware selects file data in chunks of 128bit. This chunk of data is encrypted using previously generated Key and IV in CBC mode.<\/p>\n<figure id=\"attachment_86659\" aria-describedby=\"caption-attachment-86659\" style=\"width: 844px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86659\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig13_encrypt_file_AES256.png\" alt=\"\" width=\"844\" height=\"331\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig13_encrypt_file_AES256.png 844w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig13_encrypt_file_AES256-300x118.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig13_encrypt_file_AES256-768x301.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig13_encrypt_file_AES256-650x255.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig13_encrypt_file_AES256-789x309.png 789w\" sizes=\"(max-width: 844px) 100vw, 844px\" \/><figcaption id=\"caption-attachment-86659\" class=\"wp-caption-text\">Fig 13: AES Algorithm<\/figcaption><\/figure>\n<p>Once all files present in list \u201c<strong><em><b><i>FilesToHarm\u201d<\/i><\/b><\/em><\/strong><em><i>\u00a0<\/i><\/em>are encrypted, this ransomware sends all generated information like Identifier, Installdate, cryKey,\u00a0and\u00a0cryIV\u00a0to below CnC URL\u00a0which is present in the file.<\/p>\n<p><em><i>\u00a0<\/i><\/em><strong><em><b><i>hxxp:\/\/tempacc11vl[.]000webhostapp[.]com\/marthas_stuff\/uphash[.]php<\/i><\/b><\/em><\/strong><em><i>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/i><\/em><\/p>\n<p>Then, the ransomware creates its shortcut on the desktop\u00a0with the name \u201c<strong><em><b><i>@ShrugDecryptor@<\/i><\/b><\/em><\/strong>\u201d. Name to this shortcut is given in order to fool the victim.<\/p>\n<figure id=\"attachment_86660\" aria-describedby=\"caption-attachment-86660\" style=\"width: 1064px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86660\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig14_shortcut.png\" alt=\"\" width=\"1064\" height=\"382\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig14_shortcut.png 1064w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig14_shortcut-300x108.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig14_shortcut-768x276.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig14_shortcut-650x233.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig14_shortcut-789x283.png 789w\" sizes=\"(max-width: 1064px) 100vw, 1064px\" \/><figcaption id=\"caption-attachment-86660\" class=\"wp-caption-text\">Fig 14: Create Shortcut to Desktop<\/figcaption><\/figure>\n<div class=\"mceTemp\"><\/div>\n<p>After creating a shortcut, it shows below ransom note, it contains time left to decrypt files along with bitcoin wallet address of ransomware author.<\/p>\n<figure id=\"attachment_86661\" aria-describedby=\"caption-attachment-86661\" style=\"width: 764px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86661\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/Fig15_ransom_note_pic.png\" alt=\"\" width=\"764\" height=\"500\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig15_ransom_note_pic.png 764w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig15_ransom_note_pic-300x196.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/Fig15_ransom_note_pic-596x390.png 596w\" sizes=\"(max-width: 764px) 100vw, 764px\" \/><figcaption id=\"caption-attachment-86661\" class=\"wp-caption-text\">Fig 15: Ransom Note<\/figcaption><\/figure>\n<div class=\"mceTemp\"><\/div>\n<p>Along with file encryption, the ransomware can perform other activities like file decryption and file deletion.<\/p>\n<p>Files are decrypted after ransom amount in form of Bitcoin is paid to malware author at wallet address \u201c<strong><em><b><i>1Hr1grgH9ViEgUx73iRRJLVKH3PFjUteNx<\/i><\/b><\/em><\/strong>\u201d.<\/p>\n<div class=\"mceTemp\"><\/div>\n<figure id=\"attachment_86662\" aria-describedby=\"caption-attachment-86662\" style=\"width: 589px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86662\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig16_decrypt.png\" alt=\"\" width=\"589\" height=\"245\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig16_decrypt.png 589w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig16_decrypt-300x125.png 300w\" sizes=\"(max-width: 589px) 100vw, 589px\" \/><figcaption id=\"caption-attachment-86662\" class=\"wp-caption-text\">Fig 16: Function to Decrypt Files<\/figcaption><\/figure>\n<p>If ransom amount is not paid within a specified\u00a0time duration, all encrypted files are deleted.<\/p>\n<figure id=\"attachment_86663\" aria-describedby=\"caption-attachment-86663\" style=\"width: 595px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86663\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig17_delete.png\" alt=\"\" width=\"595\" height=\"243\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig17_delete.png 595w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig17_delete-300x123.png 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><figcaption id=\"caption-attachment-86663\" class=\"wp-caption-text\">Fig 17: Function to Delete Files<\/figcaption><\/figure>\n<p>After successful deletion of an encrypted\u00a0file, this ransomware also deletes all its traces. DeleteSubKey deletes Registry \u201c<strong><em><b><i>HKCU\\ShrugTwo<\/i><\/b><\/em><\/strong>\u201d and then creates a process to delete itself.<\/p>\n<div class=\"mceTemp\"><\/div>\n<figure id=\"attachment_86664\" aria-describedby=\"caption-attachment-86664\" style=\"width: 713px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86664\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2018\/08\/fig18_Self_destruct.png\" alt=\"\" width=\"713\" height=\"429\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig18_Self_destruct.png 713w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig18_Self_destruct-300x181.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig18_Self_destruct-648x390.png 648w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/fig18_Self_destruct-250x150.png 250w\" sizes=\"(max-width: 713px) 100vw, 713px\" \/><figcaption id=\"caption-attachment-86664\" class=\"wp-caption-text\">Fig 18: Self-Destruction<\/figcaption><\/figure>\n<p><strong><b>Indicators of compromise:<\/b><\/strong><\/p>\n<p>MD5: 04112aec47401c3d91a92cfdf9de02e6<\/p>\n<p>Registry: HKCU\\ShrugTwo<\/p>\n<p>Bitcoin Wallet Address: 1Hr1grgH9ViEgUx73iRRJLVKH3PFjUteNx<\/p>\n<p>URL:<\/p>\n<p>hxxp:\/\/clients3[.]google[.]com\/generate_204<\/p>\n<p>hxxp:\/\/tempacc11vl[.]000webhostapp[.]com\/marthas_stuff\/upoldhash[.]php<\/p>\n<p><a href=\"https:\/\/bit.ly\/2ncPU26\">Quick Heal<\/a>\u00a0successfully detects Shrug2 ransomware as \u201c<strong><b>Ransom.Shrug.ZZ1<\/b><\/strong>\u201d<\/p>\n<p><strong><b>Prevention tips<\/b><\/strong><\/p>\n<ol>\n<li>Regularly take a backup of your important data in external drives like HDD, pen drive or Cloud storage.<\/li>\n<li>Install an antivirus and keep it updated.<\/li>\n<li>Keep your Operating System and software up-to-date.<\/li>\n<li>Never click on links or download attachments from any unknown or unwanted sources.<\/li>\n<\/ol>\n<p><strong>Subject Matter Expert<\/strong><\/p>\n<p>Piyush Bansal,\u00a0 Pratik Pachpor | Quick Heal Security Labs<\/p>\n<div class=\"mceTemp\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>For\u00a0several months, Quick Heal Security Labs has been observing an increase in ransomware\u00a0which are\u00a0built in\u00a0 .NET\u00a0framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are\u00a0finding it very easy to build and obfuscate malware in .NET framework rather than making them in other compilers. Quick Heal Security [&hellip;]<\/p>\n","protected":false},"author":51,"featured_media":86665,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164,910],"tags":[1300,1020,331,49],"class_list":["post-86646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime","category-ransomware","tag-data-backup","tag-data-loss-prevention","tag-encryption","tag-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86646"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86646"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86646\/revisions"}],"predecessor-version":[{"id":86669,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86646\/revisions\/86669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86665"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}