{"id":87426,"date":"2019-01-24T17:24:00","date_gmt":"2019-01-24T11:54:00","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87426"},"modified":"2023-09-25T16:01:28","modified_gmt":"2023-09-25T10:31:28","slug":"gandcrab-ransomware-along-monero-miner-spammer","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/gandcrab-ransomware-along-monero-miner-spammer\/","title":{"rendered":"GandCrab Ransomware along with Monero Miner and Spammer"},"content":{"rendered":"<p>Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common for ransomware to be paired with miner and spammer. This type of attacks helps hackers increase their chances of profit. In case the victim does not pay the ransom, then hackers use Monero miner and spammer, ultimately attacker&#8217;s intention is to get control over the victim&#8217;s system and get the ransom.<\/p>\n<figure id=\"attachment_87427\" aria-describedby=\"caption-attachment-87427\" style=\"width: 520px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87427 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/attackchain-520x390.jpg\" alt=\"Fig.1 Attackchain\" width=\"520\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/attackchain-520x390.jpg 520w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/attackchain-300x225.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/attackchain-768x576.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/attackchain-789x591.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/attackchain.jpg 966w\" sizes=\"(max-width: 520px) 100vw, 520px\" \/><figcaption id=\"caption-attachment-87427\" class=\"wp-caption-text\">Fig.1 Attack chain<\/figcaption><\/figure>\n<p>Spam mail is the infection source of this campaign; attackers use such a type of subject name so that victim is convinced to open the mail and then the attachment. Subject name is such as \u201c<em><i>Greeting Card\u201d, \u201c<\/i><\/em><em><i>My letter just for you\u201d,\u201d Always thinking about you\u201d,\u201d This is my love letter to you\u201d,\u201d Just for you!\u201d,\u201d Wrote my thoughts down about you\u201d,\u201d I love you\u201d,\u201d Felt in love with you!\u201d.<\/i><\/em><\/p>\n<p>JavaScript is highly obfuscated with base64 encode and URL encode. It uses bitsadmin.exe and PowerShell.exe to download artifacts from Hosted malware domain.<\/p>\n<figure id=\"attachment_87429\" aria-describedby=\"caption-attachment-87429\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87429 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Deobfuscated-JavaScript-650x84.png\" alt=\"Fig.2 Deobfuscated JavaScript\" width=\"650\" height=\"84\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Deobfuscated-JavaScript-650x84.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Deobfuscated-JavaScript-300x39.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Deobfuscated-JavaScript-768x100.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Deobfuscated-JavaScript-789x103.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Deobfuscated-JavaScript.png 1270w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87429\" class=\"wp-caption-text\">Fig.2 Deobfuscated JavaScript<\/figcaption><\/figure>\n<p>The initial payload downloaded is just a downloader file which creates its self-copy, terminates itself and runs from a new location. This file downloads three new components containing Mail Spammer, Monero miner and GandCrab Ransomware.<\/p>\n<figure id=\"attachment_87431\" aria-describedby=\"caption-attachment-87431\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87431 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/12-1-650x271.png\" alt=\"Fig.3 Process Tree.\" width=\"650\" height=\"271\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/12-1-650x271.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/12-1-300x125.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/12-1-768x320.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/12-1-789x329.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/12-1.png 855w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87431\" class=\"wp-caption-text\">Fig.3 Process Tree.<\/figcaption><\/figure>\n<p><strong><b>Spammer <\/b><\/strong><\/p>\n<p>1st<strong><b>\u00a0<\/b><\/strong>stage malware is a mail spammer whose task is to send mails to different emails. It downloads and sends JavaScript (initial vector) as an attachment and sends it from different email ids. It performs a dictionary attack on those email ids which are already stored in a binary file and there is also a list of subject names which it picks up from the list and having common mail body used to create mail. Email id is created in such a way that it chooses a name from the list and appends a digit or character to it.<\/p>\n<p>Following are the figures which show a list of subject names and user email names.<\/p>\n<figure id=\"attachment_87432\" aria-describedby=\"caption-attachment-87432\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87432 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Subjects-650x101.png\" alt=\"Fig.4 Subject name list\" width=\"650\" height=\"101\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Subjects-650x101.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Subjects-300x47.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Subjects-768x120.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Subjects-789x123.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Subjects.png 983w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87432\" class=\"wp-caption-text\">Fig.4 Subject name list<\/figcaption><\/figure>\n<figure id=\"attachment_87433\" aria-describedby=\"caption-attachment-87433\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87433 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Mailer-650x153.png\" alt=\"Fig.5 User name list\" width=\"650\" height=\"153\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Mailer-650x153.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Mailer-300x70.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Mailer-768x180.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Mailer-789x185.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Mailer.png 1264w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87433\" class=\"wp-caption-text\">Fig.5 User name list<\/figcaption><\/figure>\n<p>Binary then try to connect with hxxp:\/\/icanhazip.com<strong><b>\u00a0<\/b><\/strong>this site is not malicious<strong><b>\u00a0<\/b><\/strong>this website it just tells your public facing IP in the response.<\/p>\n<p>Added persist entry in \u201cHKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\u201d<\/p>\n<p>Spammer gets the mail id list from its CnC server and uses this to send multiple spam mails to spread attachment, containing the same JavaScript file. A list has around 20000 mail ids. On every execution, it gets new mail id list from the server.<\/p>\n<figure id=\"attachment_87434\" aria-describedby=\"caption-attachment-87434\" style=\"width: 498px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87434 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/MailIDlist-498x390.png\" alt=\"Fig.6 Getting Mailing list from CnC Server\" width=\"498\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/MailIDlist-498x390.png 498w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/MailIDlist-300x235.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/MailIDlist-768x602.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/MailIDlist-789x618.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/MailIDlist.png 1099w\" sizes=\"(max-width: 498px) 100vw, 498px\" \/><figcaption id=\"caption-attachment-87434\" class=\"wp-caption-text\">Fig.6 Getting Mailing list from CnC Server<\/figcaption><\/figure>\n<p>ESMTP is user configurable relay-only Mail Transfer Agent (MTA) with send-mail compatibility. MTA is used to transfer electronic mail messages from one computer to another using SMTP. \u00a0Users in SMTP are not verified when a connection is established, \u00a0meaning the email doesn\u2019t have to trustworthy, which is the advantage of SMTP. Open SMTP relays are often used to send high volume\u00a0spam campaigns.<\/p>\n<p>Here in this packet, we can see how server-client communication happens.<\/p>\n<table style=\"height: 849px;\" width=\"1039\">\n<tbody>\n<tr>\n<td width=\"312\">Server: \u201c220 smtp.example.com ESMTP Postfix\u201d is established.<\/td>\n<td width=\"312\">(Then client server communication happens.)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Client: HELO [relay.example.com]<\/td>\n<td width=\"312\">(SMTP client logs on with its hostname)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Server: \u00a0250 smtp.example.com hello[hostname], pleased to meet you<\/td>\n<td width=\"312\">(Server confirms login)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Client: MAIL FROM:&lt;Name@randomNumber.com&gt;<\/td>\n<td width=\"312\">(Client specifies the sender address)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Server: 250 Sender ok<\/td>\n<td width=\"312\">(Server confirms)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Client: RPCT TO:&lt;receiver@mail.com&gt;<\/td>\n<td width=\"312\">(Client specifies the sender address)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Server: 250 Recipient ok<\/td>\n<td width=\"312\">(Server confirm)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Client: DATA<\/td>\n<td width=\"312\">(Client initiates the transmission of the email)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Server: 354 End data with&lt;CR&gt;&lt;LF&gt;. &lt;CR&gt;&lt;LF&gt;<\/td>\n<td width=\"312\">(The server begins the reception and indicates<\/p>\n<p>that e-mail text should be closed with a dot (\u201c.\u201d))<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Client: <a href=\"mailto:FROM:%3cName@randomNumber.com\">FROM:&lt;Name@randomNumber.com<\/a>&gt;<\/p>\n<p><a href=\"mailto:TO%3creceiver@mail.com\">TO&lt;receiver@mail.com<\/a>&gt;<\/p>\n<p>Date: Day Month Year, Time<\/p>\n<p>Subject:<\/p>\n<p>Message body<\/td>\n<td width=\"312\">(The client transmits email txt with \u201csubject name\u201d and ends with desired dot)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Server: OK<\/td>\n<td width=\"312\">(The server confirms it has successfully received the email)<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Client: QUIT<\/td>\n<td width=\"312\">(The client signals end of session)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>For more details about SMTP refer <a href=\"https:\/\/www.ionos.co.uk\/digitalguide\/e-mail\/technical-matters\/smtp\/\"><u>here<\/u><\/a>.<\/p>\n<p>Here is the mail sent using SMTP<\/p>\n<figure id=\"attachment_87436\" aria-describedby=\"caption-attachment-87436\" style=\"width: 560px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87436 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/SMTP-560x390.png\" alt=\"Fig.7 Sending Spam mail using SMTP\" width=\"560\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/SMTP-560x390.png 560w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/SMTP-300x209.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/SMTP-768x535.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/SMTP-789x549.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/SMTP-229x158.png 229w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/SMTP.png 1103w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><figcaption id=\"caption-attachment-87436\" class=\"wp-caption-text\">Fig.7 Sending Spam mail using SMTP<\/figcaption><\/figure>\n<p><strong><b>Miner<\/b><\/strong><\/p>\n<p>The 2<sup>nd<\/sup>\u00a0stage payload is Monero(XMRig) miner. The cryptonight algorithm is used by Monero miner. When miner gets executed, it creates one folder with hidden attributes and drops its self-copy with a configuration file in JSON format which is already encoded by base64. It also drops VBS file which starts lookup to a compromised server and downloads new variants. This script gets deleted after execution.<\/p>\n<figure id=\"attachment_87437\" aria-describedby=\"caption-attachment-87437\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87437 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Miner_1-650x169.png\" alt=\"Fig.8 Drops files\" width=\"650\" height=\"169\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Miner_1-650x169.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Miner_1-300x78.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Miner_1-768x199.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Miner_1-789x205.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Miner_1.png 848w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87437\" class=\"wp-caption-text\">Fig.8 Drops files<\/figcaption><\/figure>\n<p>To stay in the machine, it drops internet shortcut file in the startup folder which has codes to call self-copy of malware.<\/p>\n<figure id=\"attachment_87438\" aria-describedby=\"caption-attachment-87438\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87438 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Shortcut-650x244.png\" alt=\"Fig.9 Shortcut file\" width=\"650\" height=\"244\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Shortcut-650x244.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Shortcut-300x113.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Shortcut-768x289.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Shortcut-789x297.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Shortcut.png 960w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87438\" class=\"wp-caption-text\">Fig.9 Shortcut file<\/figcaption><\/figure>\n<p>Following is the screenshot of a decoded configuration file.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_87439\" aria-describedby=\"caption-attachment-87439\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87439 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/cfg-400x390.png\" alt=\"Fig.10 Miner JSON.\" width=\"400\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cfg-400x390.png 400w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cfg-300x293.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cfg-45x45.png 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cfg.png 740w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-87439\" class=\"wp-caption-text\">Fig.10 Miner JSON.<\/figcaption><\/figure>\n<figure id=\"attachment_87444\" aria-describedby=\"caption-attachment-87444\" style=\"width: 375px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87444 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/ww-1.png\" alt=\"Fig.11 AV-List in Miner\" width=\"375\" height=\"164\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/ww-1.png 375w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/ww-1-300x131.png 300w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/><figcaption id=\"caption-attachment-87444\" class=\"wp-caption-text\">Fig.11 AV-List in Miner<\/figcaption><\/figure>\n<p>This miner also searches for some Anti-Virus processes but there is a flaw in the code of the miner that if it finds any AV process then it doesn\u2019t do any activity loop. It continues to search for the next process.<\/p>\n<p>This miner process doesn\u2019t do any malicious activity related to a miner, it hollows its code to wupp.exe (for 32-bit OS) or notepad.exe (for 64-bit OS) process and that performs further mining activity using the configuration file.<\/p>\n<figure id=\"attachment_87446\" aria-describedby=\"caption-attachment-87446\" style=\"width: 647px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87446 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Hallow-647x390.png\" alt=\"Fig 12. Injected code in wupp.exe\" width=\"647\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Hallow-647x390.png 647w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Hallow-300x181.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Hallow-768x463.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Hallow-789x476.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Hallow-250x150.png 250w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Hallow.png 1265w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><figcaption id=\"caption-attachment-87446\" class=\"wp-caption-text\">Fig 12. Injected code in wupp.exe<\/figcaption><\/figure>\n<p>There is another loop in this miner which continuously runs and checks if taskmgr.exe is running or not. If found, then it terminates the wupp.exe\/notepad.exe process. If the taskmgr.exe process gets killed then it again hollows its code and starts mining.<\/p>\n<figure id=\"attachment_87449\" aria-describedby=\"caption-attachment-87449\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87449 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/task-manager-650x181.png\" alt=\"Fig.13 Check for taskmgr.exe\" width=\"650\" height=\"181\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/task-manager-650x181.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/task-manager-300x84.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/task-manager-768x214.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/task-manager-789x220.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/task-manager-304x84.png 304w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/task-manager.png 1365w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87449\" class=\"wp-caption-text\">Fig.13 Check for taskmgr.exe<\/figcaption><\/figure>\n<p>Following image shows how miner hides itself from the task manager.<\/p>\n<figure id=\"attachment_87473\" aria-describedby=\"caption-attachment-87473\" style=\"width: 787px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/final1.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87473 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/final1.gif\" alt=\"Fig.14 Hide from task manager\" width=\"787\" height=\"641\" \/><\/a><figcaption id=\"caption-attachment-87473\" class=\"wp-caption-text\">Fig.14 Hide from task manager<\/figcaption><\/figure>\n<p>The following traffic shows the XMRig Monero mining activity.<\/p>\n<figure id=\"attachment_87452\" aria-describedby=\"caption-attachment-87452\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87452 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/cpusg-Copy-650x220.png\" alt=\"Fig.15 XMRig traffic\" width=\"650\" height=\"220\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cpusg-Copy-650x220.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cpusg-Copy-300x102.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cpusg-Copy-768x260.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cpusg-Copy-789x267.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cpusg-Copy.png 897w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87452\" class=\"wp-caption-text\">Fig.15 XMRig traffic<\/figcaption><\/figure>\n<p><strong><b>GandCrab Ransomware<\/b><\/strong><\/p>\n<p>The 3<sup>rd<\/sup>\u00a0stage payload downloaded on the system contains GandCrab Ransomware. After execution, this file checks for Russian keyboard layout using RegKey entry, if found, then the process gets terminated.<\/p>\n<figure id=\"attachment_87453\" aria-describedby=\"caption-attachment-87453\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87453 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Reg-key-1-650x220.png\" alt=\"Fig.15 Fetch RegKey\" width=\"650\" height=\"220\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg-key-1-650x220.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg-key-1-300x101.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg-key-1-768x260.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg-key-1-789x267.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg-key-1.png 1180w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87453\" class=\"wp-caption-text\">Fig.15 Fetch RegKey<\/figcaption><\/figure>\n<figure id=\"attachment_87454\" aria-describedby=\"caption-attachment-87454\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87454 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/Reg2-650x45.png\" alt=\" Fig.16 Compare value\" width=\"650\" height=\"45\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg2-650x45.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg2-300x21.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg2-768x53.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg2-789x54.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/Reg2.png 843w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87454\" class=\"wp-caption-text\">Fig.16 Compare value<\/figcaption><\/figure>\n<p>Ransomware also searches if the Anti-Virus is running or not.<\/p>\n<p>We have already <a href=\"https:\/\/blogs.quickheal.com\/gandcrab-says-will-become-back-soon\/\"><u>published blog<\/u><\/a>\u00a0post\u00a0related to GandCrab Ransomware. We found the same behavior as discussed in the previous blog.<\/p>\n<p>Ransom-note is shown in the following image.<\/p>\n<figure id=\"attachment_87455\" aria-describedby=\"caption-attachment-87455\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87455 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/16-650x308.png\" alt=\"Fig17. GandCrab Encrypted file note\" width=\"650\" height=\"308\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/16-650x308.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/16-300x142.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/16-768x364.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/16-789x374.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/16.png 1149w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87455\" class=\"wp-caption-text\">Fig17. GandCrab Encrypted file note<\/figcaption><\/figure>\n<p><strong><b>Quick Heal Detection<\/b><\/strong><\/p>\n<p>Quick Heal successfully detected such campaigns with various detection levels.<\/p>\n<p><strong>IOC&#8217;s<\/strong><\/p>\n<p>a14a3a3036a1706408443e28399a15c1<br \/>\n916cdbc267ca752999365467c05d573b<br \/>\neb30145e2cb82687f8dac728be1e4b91<br \/>\ne0e5164cf5b19d56f33520cd44875c95<\/p>\n<p><strong><b>Conclusion<\/b><\/strong><\/p>\n<p>JavaScript is already used to deliver different malware as the initial attack vector in spam mail campaigns. \u201cLOVE YOU\u201d tag is used to catch the user\u2019s attention and prompt him to open the attachment which invariably infects the machine. So beware of such kind of spam emails and attachments.<\/p>\n<p><strong><b>Subject Matter Expert:<\/b><\/strong><\/p>\n<p>Prashant Tilekar, Aniruddha Dolas\u00a0| Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common for ransomware to be paired with miner and spammer. This type of attacks helps hackers increase [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":87472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1613,164,21,133,24,910,293],"tags":[],"class_list":["post-87426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptojacking","category-cyber-crime","category-email","category-hacker","category-malware","category-ransomware","category-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87426"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87426"}],"version-history":[{"count":19,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87426\/revisions"}],"predecessor-version":[{"id":92088,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87426\/revisions\/92088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87472"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}