{"id":87153,"date":"2018-12-14T17:28:50","date_gmt":"2018-12-14T11:58:50","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87153"},"modified":"2018-12-14T17:47:00","modified_gmt":"2018-12-14T12:17:00","slug":"ghost-has-arrived","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/ghost-has-arrived\/","title":{"rendered":"Ghost Has Arrived"},"content":{"rendered":"<p>On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files.<\/p>\n<p><strong><b>Technical Analysis :<\/b><\/strong><\/p>\n<p>Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection vector of this ransomware is still unknown, but this file may arrive on the victim\u2019s machine via spam emails, malvertising, bundled with other files, etc. It uses an icon of the spreadsheet to deceive the user to think he has received an invoice\/quotation etc.<\/p>\n<p>Initially, Ghost.exe queries \u201cwww.12312312eewfef231.com\u201d. This domain is not registered, but if it is registered then it can work as a kill switch as it performs its malicious activity in the catch for the exception as shown in Fig. 1.<\/p>\n<figure id=\"attachment_87154\" aria-describedby=\"caption-attachment-87154\" style=\"width: 541px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87154\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig1.png\" alt=\"\" width=\"541\" height=\"187\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig1.png 541w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig1-300x104.png 300w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><figcaption id=\"caption-attachment-87154\" class=\"wp-caption-text\">Fig. 1: DNS Query<\/figcaption><\/figure>\n<p>Ghost.exe drops an executable GhostService.exe at location \u201c%appdata%\\Ghost\u201d on the victim&#8217;s machine. It also creates a bat file (Ghost.bat) in Ghost folder and executes it. Ghost.bat creates a service with display name as\u201cGhost\u201d, binpath as\u201c%appdata%\\Ghost\\GhostService.exe&#8221; and start mode as \u201cauto\u201d as shown in Fig. 2. Due to auto mode, malware service will be auto-started on every system startup.<\/p>\n<figure id=\"attachment_87155\" aria-describedby=\"caption-attachment-87155\" style=\"width: 762px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87155\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig2.png\" alt=\"\" width=\"762\" height=\"208\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig2.png 762w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig2-300x82.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig2-650x177.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig2-304x84.png 304w\" sizes=\"(max-width: 762px) 100vw, 762px\" \/><figcaption id=\"caption-attachment-87155\" class=\"wp-caption-text\">Fig. 2: Code to create \u201cGhost.bat\u201d<\/figcaption><\/figure>\n<figure id=\"attachment_87156\" aria-describedby=\"caption-attachment-87156\" style=\"width: 993px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87156\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig3.png\" alt=\"\" width=\"993\" height=\"96\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig3.png 993w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig3-300x29.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig3-768x74.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig3-650x63.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig3-789x76.png 789w\" sizes=\"(max-width: 993px) 100vw, 993px\" \/><figcaption id=\"caption-attachment-87156\" class=\"wp-caption-text\">Fig. 3: Content of Ghost.bat to register service<\/figcaption><\/figure>\n<p>Once the service is successfully registered Ghost.exe starts \u201cGhost\u201d service as shown in Fig. 4.<\/p>\n<figure id=\"attachment_87157\" aria-describedby=\"caption-attachment-87157\" style=\"width: 554px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87157\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig4.png\" alt=\"\" width=\"554\" height=\"306\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig4.png 554w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig4-300x166.png 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><figcaption id=\"caption-attachment-87157\" class=\"wp-caption-text\">Fig. 4: Function to start Ghost Service<\/figcaption><\/figure>\n<p>GhostService.exe creates a .txt file named \u201cDo_Not_Delete_codeId.txt\u201d at the root of\u201cC\u201d drive with Code ID as a content. This Code ID is randomly generated as shown in Fig. 5.<\/p>\n<figure id=\"attachment_87158\" aria-describedby=\"caption-attachment-87158\" style=\"width: 698px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87158\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig5.png\" alt=\"\" width=\"698\" height=\"225\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig5.png 698w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig5-300x97.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig5-650x210.png 650w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><figcaption id=\"caption-attachment-87158\" class=\"wp-caption-text\">Fig. 5: Function to generate random Code ID<\/figcaption><\/figure>\n<p>Now it calls a function \u201cstartProcess\u201d to drop components at the root of \u201cC\u201d drive.<\/p>\n<p>As shown in Fig. 6, GhostService.exe drops below components:<\/p>\n<ul>\n<li>GhostForm.exe &#8211; Displays Ransom note and encrypt files<\/li>\n<li>GhostFile.dll &#8211; Exports functions to create a list of files<\/li>\n<li>GhostHammer.dll &#8211; Exports AES_Encrypt function\n<p><figure id=\"attachment_87159\" aria-describedby=\"caption-attachment-87159\" style=\"width: 1152px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87159\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig6.png\" alt=\"\" width=\"1152\" height=\"643\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig6.png 1152w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig6-300x167.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig6-768x429.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig6-650x363.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig6-789x440.png 789w\" sizes=\"(max-width: 1152px) 100vw, 1152px\" \/><figcaption id=\"caption-attachment-87159\" class=\"wp-caption-text\">Fig. 6: Function to drop components and start GhostForm.exe<\/figcaption><\/figure><\/li>\n<\/ul>\n<p>After dropping the components, it runs GhostForm.exe. Then it calls a function \u201cDatabase\u201d to stop MSSQLSERVER service and encrypt files in \u201cMicrosoft\u00a0SQL\u00a0Server\u201d folder.<\/p>\n<figure id=\"attachment_87160\" aria-describedby=\"caption-attachment-87160\" style=\"width: 1096px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87160\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig7.png\" alt=\"\" width=\"1096\" height=\"687\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig7.png 1096w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig7-300x188.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig7-768x481.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig7-622x390.png 622w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig7-789x495.png 789w\" sizes=\"(max-width: 1096px) 100vw, 1096px\" \/><figcaption id=\"caption-attachment-87160\" class=\"wp-caption-text\">Fig. 7: Function to encrypt Database files<\/figcaption><\/figure>\n<figure id=\"attachment_87161\" aria-describedby=\"caption-attachment-87161\" style=\"width: 727px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87161\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig8.png\" alt=\"\" width=\"727\" height=\"399\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig8.png 727w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig8-300x165.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig8-650x357.png 650w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/><figcaption id=\"caption-attachment-87161\" class=\"wp-caption-text\">Fig. 8: Function to stop SQL service<\/figcaption><\/figure>\n<p>It has a list of file extensions which are to be encrypted as shown in Fig. 9.<\/p>\n<figure id=\"attachment_87162\" aria-describedby=\"caption-attachment-87162\" style=\"width: 878px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87162\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig9.png\" alt=\"\" width=\"878\" height=\"242\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig9.png 878w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig9-300x83.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig9-768x212.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig9-650x179.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig9-789x217.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig9-304x84.png 304w\" sizes=\"(max-width: 878px) 100vw, 878px\" \/><figcaption id=\"caption-attachment-87162\" class=\"wp-caption-text\">Fig. 9: List of file extensions to be encrypted by GhostService.exe<\/figcaption><\/figure>\n<p>Also, it calls a function \u201cdatosC\u201d that encrypts files present only at the root of \u201cC\u201d drive.<\/p>\n<figure id=\"attachment_87163\" aria-describedby=\"caption-attachment-87163\" style=\"width: 1129px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87163\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig10.png\" alt=\"\" width=\"1129\" height=\"544\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig10.png 1129w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig10-300x145.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig10-768x370.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig10-650x313.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig10-789x380.png 789w\" sizes=\"(max-width: 1129px) 100vw, 1129px\" \/><figcaption id=\"caption-attachment-87163\" class=\"wp-caption-text\">Fig. 10: Function to encrypt files at the root of \u201cC\u201d drive<\/figcaption><\/figure>\n<p>GhostService.exe maintains a timer which repeats these tasks after every 120 seconds.<\/p>\n<figure id=\"attachment_87164\" aria-describedby=\"caption-attachment-87164\" style=\"width: 644px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87164\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig11.png\" alt=\"\" width=\"644\" height=\"296\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig11.png 644w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig11-300x138.png 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><figcaption id=\"caption-attachment-87164\" class=\"wp-caption-text\">Fig. 11: Timer function<\/figcaption><\/figure>\n<p>GhostForm.exe displays a Ransom note. It also maintains a timer, after every 120 seconds it closes the Ransom note.<\/p>\n<figure id=\"attachment_87165\" aria-describedby=\"caption-attachment-87165\" style=\"width: 731px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87165\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig12.png\" alt=\"\" width=\"731\" height=\"454\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig12.png 731w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig12-300x186.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig12-628x390.png 628w\" sizes=\"(max-width: 731px) 100vw, 731px\" \/><figcaption id=\"caption-attachment-87165\" class=\"wp-caption-text\">Fig. 12: Ransom Note<\/figcaption><\/figure>\n<p>Code ID in ransom note is same as one written to C:\\Do_Not_Delete_codeId.txt.<\/p>\n<p>As seen in Fig. 12 malware author demands Bitcoin worth 500 USD to be paid to the following address : https:\/\/blockchain.info\/payment_request?address=1N7AmqH12EN3yAkVMPB5rZoVX758jgLbzj&amp;amount_local=500&amp;currency=USD&amp;nosavecurrency=true&amp;message=Pay%20me!<\/p>\n<figure id=\"attachment_87166\" aria-describedby=\"caption-attachment-87166\" style=\"width: 369px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87166\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig13.png\" alt=\"\" width=\"369\" height=\"49\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig13.png 369w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig13-300x40.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><figcaption id=\"caption-attachment-87166\" class=\"wp-caption-text\">Fig. 13: Contents of Do_Not_Delete_codeId.txt<\/figcaption><\/figure>\n<p>Next, it calls a function \u201cstartEncrypt\u201d to create a list of files present in the following folders :<\/p>\n<ul>\n<li>Desktop<\/li>\n<li>Document<\/li>\n<li>Picture<\/li>\n<li>Videos<\/li>\n<li>Music<\/li>\n<\/ul>\n<p>As seen in the above list,\u00a0malware encrypts the files at some specific locations only. It has targeted Desktop folder where the user usually keeps\u00a0most of their data. Also, Document, Pictures, Videos, and Music are folders provided by Windows OS to store respective type of files.<\/p>\n<figure id=\"attachment_87167\" aria-describedby=\"caption-attachment-87167\" style=\"width: 853px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87167\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig14.png\" alt=\"\" width=\"853\" height=\"675\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig14.png 853w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig14-300x237.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig14-768x608.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig14-493x390.png 493w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig14-789x624.png 789w\" sizes=\"(max-width: 853px) 100vw, 853px\" \/><figcaption id=\"caption-attachment-87167\" class=\"wp-caption-text\">Fig. 14: Function to create a list of files and encrypt them<\/figcaption><\/figure>\n<p>Functions to get the list of files from above-mentioned folders are present in GhostFile.dll.<\/p>\n<figure id=\"attachment_87168\" aria-describedby=\"caption-attachment-87168\" style=\"width: 882px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87168\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig15.png\" alt=\"\" width=\"882\" height=\"401\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig15.png 882w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig15-300x136.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig15-768x349.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig15-650x296.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig15-789x359.png 789w\" sizes=\"(max-width: 882px) 100vw, 882px\" \/><figcaption id=\"caption-attachment-87168\" class=\"wp-caption-text\">Fig. 15: Function to create a list of files in the Desktop folder<\/figcaption><\/figure>\n<figure id=\"attachment_87169\" aria-describedby=\"caption-attachment-87169\" style=\"width: 881px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87169\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig16.png\" alt=\"\" width=\"881\" height=\"651\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig16.png 881w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig16-300x222.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig16-768x568.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig16-528x390.png 528w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig16-789x583.png 789w\" sizes=\"(max-width: 881px) 100vw, 881px\" \/><figcaption id=\"caption-attachment-87169\" class=\"wp-caption-text\">Fig. 16: Function to create a list of files in the Documents folder<\/figcaption><\/figure>\n<figure id=\"attachment_87170\" aria-describedby=\"caption-attachment-87170\" style=\"width: 903px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87170\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig17.png\" alt=\"\" width=\"903\" height=\"587\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig17.png 903w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig17-300x195.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig17-768x499.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig17-600x390.png 600w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig17-789x513.png 789w\" sizes=\"(max-width: 903px) 100vw, 903px\" \/><figcaption id=\"caption-attachment-87170\" class=\"wp-caption-text\">Fig. 17: Function to create a list of files in the Pictures folder<\/figcaption><\/figure>\n<figure id=\"attachment_87171\" aria-describedby=\"caption-attachment-87171\" style=\"width: 894px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87171\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig18.png\" alt=\"\" width=\"894\" height=\"588\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig18.png 894w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig18-300x197.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig18-768x505.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig18-593x390.png 593w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig18-789x519.png 789w\" sizes=\"(max-width: 894px) 100vw, 894px\" \/><figcaption id=\"caption-attachment-87171\" class=\"wp-caption-text\">Fig. 18: Function to create a list of files in the Videos folder<\/figcaption><\/figure>\n<figure id=\"attachment_87172\" aria-describedby=\"caption-attachment-87172\" style=\"width: 905px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87172\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig19.png\" alt=\"\" width=\"905\" height=\"585\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig19.png 905w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig19-300x194.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig19-768x496.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig19-603x390.png 603w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig19-789x510.png 789w\" sizes=\"(max-width: 905px) 100vw, 905px\" \/><figcaption id=\"caption-attachment-87172\" class=\"wp-caption-text\">Fig. 19: Function to create a list of files in the Music folder<\/figcaption><\/figure>\n<p>The malware creates a list of files based on extensions present in the extension list as shown in Fig. 20. Once the list of files is ready, encryption routine is called from GhostHammer.dll. Files are encrypted using AES algorithm and \u201c.Ghost\u201dextension is added to encrypted files.<\/p>\n<figure id=\"attachment_87173\" aria-describedby=\"caption-attachment-87173\" style=\"width: 878px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87173\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/12\/Fig20.png\" alt=\"\" width=\"878\" height=\"244\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig20.png 878w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig20-300x83.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig20-768x213.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig20-650x181.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig20-789x219.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/12\/Fig20-304x84.png 304w\" sizes=\"(max-width: 878px) 100vw, 878px\" \/><figcaption id=\"caption-attachment-87173\" class=\"wp-caption-text\">Fig. 20: List of file extensions to be encrypted by GhostForm.exe<\/figcaption><\/figure>\n<p>Difference between the 2 extension list is \u201c.txt\u201d files are not encrypted by GhostService whereas they are encrypted by GhostForm.exe.<\/p>\n<p><strong>IOCs :<\/strong><\/p>\n<p>3a2633cd5152a229d1f986073082ecd0<\/p>\n<p>3d33f7f9f2e5fa3f4e7d2d6de5c9b7f1<\/p>\n<p>464da6c4465816cba2d278634e2b9d3e<\/p>\n<p>5db40b7c42376cc077383069a9c509eb<\/p>\n<p>b93588bbb3f3f0addd5598586bbe2566<\/p>\n<p>cd0f7f29e337f2ebe455ba4a85fb2b70<\/p>\n<p><strong>Quick Heal products detects these malware with below names :<\/strong><\/p>\n<p>&#8220;Ransom.Ghost.S*&#8221;<\/p>\n<p>&#8220;Ransom.Bat.Ghost.*&#8221;<\/p>\n<p><strong><b>Conclusion :<\/b><\/strong><\/p>\n<p>We have seen the ransomware count to have\u00a0significantly increased in recent times. Malware authors have started using different techniques to encrypt user files.<\/p>\n<p><strong>Some general recommendations to stay safe from Ransomware :<\/strong><\/p>\n<ul>\n<li>Do not open suspicious emails, especially if they have an attachment.<\/li>\n<li>Update your Operating System(OS)<\/li>\n<li>Update your software. Older and outdated versions of software have vulnerabilities which are mostly exploited by attackers to infect your system.<\/li>\n<li>Take regular data backup and keep it in a secure location.<\/li>\n<li>Use a multi-layered antivirus in your system which will protect you from real-time threats. And keep your antivirus up-to-date.<\/li>\n<\/ul>\n<p><strong>Subject Matter Expert:<\/strong><\/p>\n<p>Ravi Gidwani | Quick Heal Security Labs<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection vector of this ransomware is [&hellip;]<\/p>\n","protected":false},"author":51,"featured_media":87177,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,24,910,5,304,293],"tags":[1637,1635,331,1638,50,1636],"class_list":["post-87153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-malware","category-ransomware","category-security","category-social-engineering-2","category-spam","tag-database","tag-dotnet","tag-encryption","tag-kill-switch","tag-ransomware","tag-user-files"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87153"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87153"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87153\/revisions"}],"predecessor-version":[{"id":87181,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87153\/revisions\/87181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87177"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}