{"id":88443,"date":"2020-01-24T16:30:51","date_gmt":"2020-01-24T11:00:51","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=88443"},"modified":"2020-01-24T16:30:51","modified_gmt":"2020-01-24T11:00:51","slug":"ako-ransomware-targeting-businesses-using-raas","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/ako-ransomware-targeting-businesses-using-raas\/","title":{"rendered":"Ako Ransomware targeting businesses using RaaS"},"content":{"rendered":"<p><strong>Ako Ransomware targeting businesses using RaaS<\/strong><\/p>\n<p>Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is seen that many malware families these days are using MaaS to infect more and more users.<\/p>\n<p><strong>What is MaaS: &#8211; <\/strong><\/p>\n<p>In the legitimate business world, the term Software-as-a-Service is more useful for Software which is controlled centrally and made available for the user by providing the license. Now in malware business, there is the term Maas (Malware-as-a-Service) that provides illegal service for the attackers. The black-market service Malware-as-a-Service provides malware such as Viruses, Worms, Banking Trojans, Ransomware that buyers can acquire and earn money through it.<\/p>\n<p>The criminal customer must pay rent for the malware and the developer needs to keep their Malware-as-a-Service updated by exploring new exploits so that they can target many victims. The recent trend shows that usage of cloud in day to day tasks and business is on the rise multifold &amp; the malware authors are very keen to exploit this user database by selling the malware as cloud services.<\/p>\n<p>Malware-as-a-Service is a managed service model that consists of three levels:<\/p>\n<ol>\n<li>In the first level, the skilled developer constructs the malware by exploiting known vulnerabilities, malicious payloads through emails, phishing, and various other techniques.<\/li>\n<li>The second level of distributors will host computer systems.<\/li>\n<li>The third level is the treasurer for transferring the fund.<\/li>\n<\/ol>\n<p>The buying and selling of malware such as ransomware etc. take place over the <strong>darknet. <\/strong>Darknet is often referred to as the part of the Deep Web which is hidden from the common public. It is the encrypted part of the internet where not just malware trading but several illegal activities like trading of credit card data, or any other PII (personal identifiable information) takes place. The developer uses this platform as a medium to sell their malware.<\/p>\n<p>We\u2019ve seen that many ransomware authors use Darknet to trade their ransomware with potential criminal customers. These authors then sell ransomware with the condition to get a fair share of the ransom that the buyer gets, by spreading it to various networks. This scenario is termed as <strong>Ransomware-as-a-Service.<\/strong><\/p>\n<p><strong>Ako Ransomware: &#8211;<\/strong><\/p>\n<p>The recently observed ransomware named as Ako is also based on Ransomware-as-a-Service. Like most others, instead of targeting individuals, Ako ransomware targets businesses and spreads across networks. It uses emails as a propagation mechanism. The email contains an attachment which is a password protected zip file named as \u2018agreement.zip\u2019. Upon the extraction of this zip file, \u2018agreement.scr\u2019\u00a0 is dropped which is an executable file responsible for ransomware activity.<\/p>\n<p>This ransomware is written in Microsoft Visual C\/C++.<\/p>\n<p><strong>Binary Analysis of the Ako ransomware: &#8211;<\/strong><\/p>\n<p>While analyzing the Ako ransomware, we found a list of blacklisted and whitelisted file extensions.<\/p>\n<p>The list can be seen below in fig.1a and 1b.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88448\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/1a-5.png\" alt=\"\" width=\"617\" height=\"42\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/1a-5.png 617w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/1a-5-300x20.png 300w\" sizes=\"(max-width: 617px) 100vw, 617px\" \/><\/p>\n<p style=\"text-align: center\">fig.1a List of blacklisted extensions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88451\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/1b-2.png\" alt=\"\" width=\"620\" height=\"132\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/1b-2.png 620w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/1b-2-300x64.png 300w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/p>\n<p style=\"text-align: center\">Fig.1b Blacklisted file paths<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88453\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/2-1.png\" alt=\"\" width=\"615\" height=\"251\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/2-1.png 615w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/2-1-300x122.png 300w\" sizes=\"(max-width: 615px) 100vw, 615px\" \/><\/p>\n<p style=\"text-align: center\">Fig.2 Whitelisted extensions<\/p>\n<p><strong>Execution flow:<\/strong><\/p>\n<ul>\n<li>At the beginning of execution, it disables the windows recovery environment. Also, it deletes all shadow volume copies and recent backups.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88454\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/3-1.png\" alt=\"\" width=\"444\" height=\"92\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/3-1.png 444w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/3-1-300x62.png 300w\" sizes=\"(max-width: 444px) 100vw, 444px\" \/><\/p>\n<p style=\"text-align: center\">Fig.3 Command used to delete the shadow copies.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88457\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/4-2.png\" alt=\"\" width=\"444\" height=\"88\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/4-2.png 444w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/4-2-300x59.png 300w\" sizes=\"(max-width: 444px) 100vw, 444px\" \/><\/p>\n<p style=\"text-align: center\">Fig.4 Commands for disabling recovery environment<\/p>\n<ul>\n<li>The ransomware creates a new value <strong>EnableLinkedConnections<\/strong> under the registry key <strong>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System<\/strong> Using RegCreateKeyA And sets the value of <strong>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System<\/strong>\\<strong>EnableLinkedConnections<\/strong>to 1 using RegSetValueExW .<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88458\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/5.png\" alt=\"\" width=\"782\" height=\"91\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/5.png 782w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/5-300x35.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/5-768x89.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/5-650x76.png 650w\" sizes=\"(max-width: 782px) 100vw, 782px\" \/><\/p>\n<p style=\"text-align: center\">Fig.5 Addition of Registry Key<\/p>\n<ul>\n<li>This value is set so that the ransomware can gain access to the processes that require User Access Control (UAC). In case it does not have UAC permissions, it will not be able to spread through mapped network drives.<\/li>\n<li>It begins encryption according to the blacklisted and whitelisted file extensions and avoids files from the program files, system data. It makes sure that the files encrypted have important data of the users such as documents, databases, spreadsheets, archives, presentations, images, and other file types. In this way, the user is forced to pay the ransom. After encryption, it adds the randomly generated extension which contains six digits alphanumeric as shown below.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88460\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/6-1.png\" alt=\"\" width=\"775\" height=\"237\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/6-1.png 775w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/6-1-300x92.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/6-1-768x235.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/6-1-650x199.png 650w\" sizes=\"(max-width: 775px) 100vw, 775px\" \/><\/p>\n<p style=\"text-align: center\">Fig.6 Encrypted files<\/p>\n<ul>\n<li>It also adds a file marker \u2018<strong>CECAEFBE\u2019 <\/strong>hex value at the end of each encrypted file. The marker is added as an indication that the file is already encrypted and this way it\u2019ll save a lot of time. The marker is shown below in the fig.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88461\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/7.png\" alt=\"\" width=\"617\" height=\"79\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/7.png 617w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/7-300x38.png 300w\" sizes=\"(max-width: 617px) 100vw, 617px\" \/><\/p>\n<p style=\"text-align: center\">Fig.7 File marker<\/p>\n<ul>\n<li>After encrypting an entire system, it scans the network for other systems that can be encrypted. It uses \u2018IcmpSendEcho\u2019 function to search for other IP addresses in the domain. It further keeps hunting for new systems after encrypting an accessible system.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88463\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/8-2.png\" alt=\"\" width=\"556\" height=\"35\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/8-2.png 556w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/8-2-300x19.png 300w\" sizes=\"(max-width: 556px) 100vw, 556px\" \/><\/p>\n<p style=\"text-align: center\">Fig.8 Loop used for scanning Ip\u2019s one by one<\/p>\n<ul>\n<li>It uses AES Algorithm for encryption of the files and the key for decryption of files is also present in the victim\u2019s system in an encrypted format, so it&#8217;s hard to decrypt the files.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Ransom Note: &#8211;<\/strong><\/p>\n<p>Ako drops a ransom note \u2018\u2019 ako-readme.txt\u2019 in every folder which contains an infected file. Along with the ransom note, it also drops an \u2018id.key\u2019 file.\u00a0 Through the ransom note, it informs the victims that their network has been locked. Like other ransomware, it doesn\u2019t provide the victim with email id. Rather it provides them a link to a website that can be accessed through \u2018Tor Browser\u2019 and even guides them on how to download it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88464\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/9-1.png\" alt=\"\" width=\"1170\" height=\"508\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/9-1.png 1170w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/9-1-300x130.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/9-1-768x333.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/9-1-650x282.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/9-1-789x343.png 789w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/p>\n<p style=\"text-align: center\">Fig.9 Ransom Note<\/p>\n<p>The personal ID in ako-readme.txt is a BASE64 encoded text. When we decode the text, we get the JSON formatted text which contains an extension to be added after encryption, an encrypted key which is same as the key in the \u2018id.key\u2019 file. In addition to the key, it also contains information about the network configuration settings, version of ransomware and sub-id.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88465\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/10.png\" alt=\"\" width=\"1302\" height=\"109\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/10.png 1302w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/10-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/10-768x64.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/10-650x54.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/10-789x66.png 789w\" sizes=\"(max-width: 1302px) 100vw, 1302px\" \/><\/p>\n<p style=\"text-align: center\">Fig.10 Decoded Personal ID<\/p>\n<p>On visiting the website, it asks to enter the unique decryption key which is in the ransom note itself. Then it asks the victim to transfer the ransom into a bitcoin wallet.<\/p>\n<p>Safety measures:<\/p>\n<ol>\n<li>Patch your PCs and server early and frequently.<\/li>\n<li>Be careful while downloading files from unidentified email addresses.<\/li>\n<li>Don\u2019t enable MACRO\u2019s while viewing doc files received through emails.<\/li>\n<li>Back up your PCs and Servers regularly and remember to keep a copy in some external storage drive.<\/li>\n<\/ol>\n<p>Because it is said:<\/p>\n<p>Prevention Is Better Than Cure!!!<\/p>\n<p>&nbsp;<\/p>\n<p>Subject Matter Experts: &#8211; Shivani Mule, Lavisha Mehndiratta | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is seen that many malware families [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":88468,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1214,164,289,1529,21,1671,171,24,910,5,293,1],"tags":[],"class_list":["post-88443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-security-terms-2","category-cyber-crime","category-cyber-safety","category-data-breach","category-email","category-encryption","category-enterprise","category-malware","category-ransomware","category-security","category-spam","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88443"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=88443"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88443\/revisions"}],"predecessor-version":[{"id":88467,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88443\/revisions\/88467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/88468"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=88443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=88443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=88443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}