{"id":88547,"date":"2020-02-13T15:27:14","date_gmt":"2020-02-13T09:57:14","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=88547"},"modified":"2020-02-13T15:27:14","modified_gmt":"2020-02-13T09:57:14","slug":"deep-dive-wakeup-lan-wol-implementation-ryuk","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/deep-dive-wakeup-lan-wol-implementation-ryuk\/","title":{"rendered":"A Deep Dive Into Wakeup On Lan (WoL) Implementation of Ryuk"},"content":{"rendered":"<p>Quick Heal Security Labs recently came across a variant of Ryuk Ransomware which contains an additional feature of identifying and encrypting\u00a0systems\u00a0in a Local Area Network (LAN). This sample targets the systems which are present in sleep as well as the online state in the LAN. This sample is packed with a custom packer. The final unpack routine which extracts the payload of Ryuk Ransomware is as shown below.<\/p>\n<figure id=\"attachment_88554\" aria-describedby=\"caption-attachment-88554\" style=\"width: 421px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88554 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-1_Final-Unpack-routine-421x390.png\" alt=\"\" width=\"421\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-1_Final-Unpack-routine-421x390.png 421w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-1_Final-Unpack-routine-300x278.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-1_Final-Unpack-routine.png 548w\" sizes=\"(max-width: 421px) 100vw, 421px\" \/><figcaption id=\"caption-attachment-88554\" class=\"wp-caption-text\">Fig 1:Final Unpack Routine<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>The payload contains two stages of the decryption routine. Basically, 1<sup>st<\/sup> stage is the input to 2<sup>nd<\/sup> stage and starts with decrypt \u201cadvapi32.dll\u201d obfuscated string and its related function names such as CryptCreateHash, CryptHashData, CryptDestroyHash to reverse md5 hash of \u201c5d65e9cb5bc2a9b609299d8758d915ab\u201d which is hardcoded in the file.<\/p>\n<figure id=\"attachment_88555\" aria-describedby=\"caption-attachment-88555\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88555 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-2_De-obfuscation-of-1st-stage-obfuscated-string-650x380.png\" alt=\"\" width=\"650\" height=\"380\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-2_De-obfuscation-of-1st-stage-obfuscated-string-650x380.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-2_De-obfuscation-of-1st-stage-obfuscated-string-300x175.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-2_De-obfuscation-of-1st-stage-obfuscated-string-768x449.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-2_De-obfuscation-of-1st-stage-obfuscated-string-789x462.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-2_De-obfuscation-of-1st-stage-obfuscated-string.png 942w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88555\" class=\"wp-caption-text\">Fig 2:De-obfuscation of 1st stage obfuscated string<\/figcaption><\/figure>\n<figure id=\"attachment_88556\" aria-describedby=\"caption-attachment-88556\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88556\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-3_After-de-obfuscation.png\" alt=\"\" width=\"650\" height=\"285\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-3_After-de-obfuscation.png 579w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-3_After-de-obfuscation-300x132.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88556\" class=\"wp-caption-text\">Fig 3:After de-obfuscation<\/figcaption><\/figure>\n<p style=\"margin: 0in;margin-bottom: .0001pt;background: white\"><span style=\"color: black\">The reverse md5 lookup of 5d65e9cb5bc2a9b609299d8758d915ab is 1560ddd.<\/span><span style=\"color: black\">During reverse md5 lookup process sample takes high processor utilization, as malware tries to calculate the md5 hash of each value from 0 to 1560ddd and compare it with 5d65e9cb5bc2a9b609299d8758d915ab.<\/span><\/p>\n<p style=\"margin: 0in;margin-bottom: .0001pt;background: white\"><span style=\"color: black\">\u00a0<\/span><span style=\"color: black\">\u201c1560ddd\u201d as an input to the below mathematical function which will generate 2<sup>nd<\/sup>\u00a0stage key stack and is used to de-obfuscate all the strings used in payload, while 1<sup>st<\/sup>\u00a0stage key stack already presents in the file.<\/span><\/p>\n<figure id=\"attachment_88557\" aria-describedby=\"caption-attachment-88557\" style=\"width: 445px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88557 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-4_Generation-of-Stage-2-key-stack-445x390.png\" alt=\"\" width=\"445\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-4_Generation-of-Stage-2-key-stack-445x390.png 445w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-4_Generation-of-Stage-2-key-stack-300x263.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-4_Generation-of-Stage-2-key-stack.png 658w\" sizes=\"(max-width: 445px) 100vw, 445px\" \/><figcaption id=\"caption-attachment-88557\" class=\"wp-caption-text\">Fig 4:Generation of Stage-2 key stack<\/figcaption><\/figure>\n<p>We have used IDA python to decrypt all obfuscated strings and rename window APIs, function names for better static analysis of payload as shown in below fig.<\/p>\n<figure id=\"attachment_88558\" aria-describedby=\"caption-attachment-88558\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88558 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-5_Part-of-Obfuscated-and-De-Obfuscate-strings-650x240.png\" alt=\"\" width=\"650\" height=\"240\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-5_Part-of-Obfuscated-and-De-Obfuscate-strings-650x240.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-5_Part-of-Obfuscated-and-De-Obfuscate-strings-300x111.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-5_Part-of-Obfuscated-and-De-Obfuscate-strings-768x283.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-5_Part-of-Obfuscated-and-De-Obfuscate-strings-789x291.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-5_Part-of-Obfuscated-and-De-Obfuscate-strings.png 890w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88558\" class=\"wp-caption-text\">Fig 5:Part of Obfuscated and De-Obfuscate strings<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_88559\" aria-describedby=\"caption-attachment-88559\" style=\"width: 504px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88559 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-6_After-Renaming-APIs-and-Obfuscate-Strings-504x390.png\" alt=\"\" width=\"504\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-6_After-Renaming-APIs-and-Obfuscate-Strings-504x390.png 504w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-6_After-Renaming-APIs-and-Obfuscate-Strings-300x232.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-6_After-Renaming-APIs-and-Obfuscate-Strings.png 601w\" sizes=\"(max-width: 504px) 100vw, 504px\" \/><figcaption id=\"caption-attachment-88559\" class=\"wp-caption-text\">Fig 6:After Renaming APIs and Obfuscate Strings<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Execution Part:<\/strong><\/p>\n<p>After resolution of APIs and their related functions, it will check for the command line argument (CLA) to be \u201c8\u201d and \u201cLAN\u201d. If not, then it drops its self-copy in the current location with a random filename and executes it by invoking \u201cShellExecuteW\u201d.<\/p>\n<figure id=\"attachment_88560\" aria-describedby=\"caption-attachment-88560\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88560 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-7_Child-Process-Created-with-CLA-\u201c8-LAN\u201d-650x32.png\" alt=\"\" width=\"650\" height=\"32\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-7_Child-Process-Created-with-CLA-\u201c8-LAN\u201d-650x32.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-7_Child-Process-Created-with-CLA-\u201c8-LAN\u201d-300x15.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-7_Child-Process-Created-with-CLA-\u201c8-LAN\u201d-768x38.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-7_Child-Process-Created-with-CLA-\u201c8-LAN\u201d-789x39.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-7_Child-Process-Created-with-CLA-\u201c8-LAN\u201d.png 1028w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88560\" class=\"wp-caption-text\">Fig 7:Child Process Created with CLA \u201c8 LAN\u201d<\/figcaption><\/figure>\n<p>The above command-line arguments are an interesting part of the Ryuk variant i.e. Wake on Lan (WoL). It is a hardware feature that allows a computer to be turned ON or awakened by a network packet. The packet is usually sent to the target computer by a program executed on a device connected to the same LAN. This feature is used for administrative functions that want to push system updates or to execute some scheduled tasks when the system is awakened. For sending WoL Packets, it collects system ARP (Address Resolution Protocol) table by calling GetIpNetTable, then extract IPv4 address from ARP structure and then send WoL packets for each valid IP address entry.<\/p>\n<figure id=\"attachment_88561\" aria-describedby=\"caption-attachment-88561\" style=\"width: 356px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88561 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-8_Extracting-ARP-Table-of-System-356x390.png\" alt=\"\" width=\"356\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-8_Extracting-ARP-Table-of-System-356x390.png 356w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-8_Extracting-ARP-Table-of-System-274x300.png 274w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-8_Extracting-ARP-Table-of-System.png 437w\" sizes=\"(max-width: 356px) 100vw, 356px\" \/><figcaption id=\"caption-attachment-88561\" class=\"wp-caption-text\">Fig 8:Extracting ARP Table of System<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_88562\" aria-describedby=\"caption-attachment-88562\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88562 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-9_Structure-Inside-ARP-Table-650x192.png\" alt=\"\" width=\"650\" height=\"192\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-9_Structure-Inside-ARP-Table-650x192.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-9_Structure-Inside-ARP-Table-300x89.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-9_Structure-Inside-ARP-Table-768x227.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-9_Structure-Inside-ARP-Table-789x233.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-9_Structure-Inside-ARP-Table.png 850w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88562\" class=\"wp-caption-text\">Fig 9:Structure Of ARP Table<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>We can get the ARP entry of a system by executing \u201cARP -A\u201d in cmd.After extracting a valid IPv4 address, it will send the magic packet to the target host. This packet is sent over the User Datagram Protocol (UDP) socket with socket option SO_BROADCAST using destination port 7. The WoL magic packet starts with FF FF FF FF FF FF followed by target\u2019s computer MAC address.<\/p>\n<figure id=\"attachment_88563\" aria-describedby=\"caption-attachment-88563\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88563 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-10-Magic-Packet-for-WoL-650x221.png\" alt=\"\" width=\"650\" height=\"221\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-10-Magic-Packet-for-WoL-650x221.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-10-Magic-Packet-for-WoL-300x102.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-10-Magic-Packet-for-WoL-768x261.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-10-Magic-Packet-for-WoL-789x268.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-10-Magic-Packet-for-WoL.png 906w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88563\" class=\"wp-caption-text\">Fig 10:Magic Packet for WoL<\/figcaption><\/figure>\n<figure id=\"attachment_88564\" aria-describedby=\"caption-attachment-88564\" style=\"width: 526px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88564 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-11-Magic-Packet-for-WoL-Implemented-by-Ryuk.png\" alt=\"\" width=\"526\" height=\"357\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-11-Magic-Packet-for-WoL-Implemented-by-Ryuk.png 526w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-11-Magic-Packet-for-WoL-Implemented-by-Ryuk-300x204.png 300w\" sizes=\"(max-width: 526px) 100vw, 526px\" \/><figcaption id=\"caption-attachment-88564\" class=\"wp-caption-text\">Fig 11:Magic Packet for WoL Implemented by Ryuk<\/figcaption><\/figure>\n<p>After successful in WoL operation, it tries to mount the remote device c$\/administrative share \u2014 if it can mount the share, it will then proceed to encrypt remote host\u2019s drive. But before the start of encryption, it checks whether it is running inside VM or not by enumerating process and services.<\/p>\n<figure id=\"attachment_88565\" aria-describedby=\"caption-attachment-88565\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88565 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-12-Enumerate-Process-and-Service-for-Checking-Virtual-Machines-650x218.png\" alt=\"\" width=\"650\" height=\"218\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-12-Enumerate-Process-and-Service-for-Checking-Virtual-Machines-650x218.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-12-Enumerate-Process-and-Service-for-Checking-Virtual-Machines-300x100.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-12-Enumerate-Process-and-Service-for-Checking-Virtual-Machines-768x257.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-12-Enumerate-Process-and-Service-for-Checking-Virtual-Machines-789x264.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-12-Enumerate-Process-and-Service-for-Checking-Virtual-Machines.png 821w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88565\" class=\"wp-caption-text\">Fig 12:Enumerate Process and Service for Checking Virtual Machines<\/figcaption><\/figure>\n<p>It will then proceed for importing the RSA 2048-bit Public key hardcoded in the file and deleting the shadow copy by invoking \u201cWMIC\u201d and \u201cvssadmin\u201d as shown in below fig.<\/p>\n<figure id=\"attachment_88566\" aria-describedby=\"caption-attachment-88566\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88566 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-13-Importing-RSA-Public-Key-and-Deleting-Shadow-Copy-550x390.png\" alt=\"\" width=\"550\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-13-Importing-RSA-Public-Key-and-Deleting-Shadow-Copy-550x390.png 550w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-13-Importing-RSA-Public-Key-and-Deleting-Shadow-Copy-300x213.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-13-Importing-RSA-Public-Key-and-Deleting-Shadow-Copy-768x545.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-13-Importing-RSA-Public-Key-and-Deleting-Shadow-Copy-789x560.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-13-Importing-RSA-Public-Key-and-Deleting-Shadow-Copy.png 833w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><figcaption id=\"caption-attachment-88566\" class=\"wp-caption-text\">Fig 13:Importing RSA Public Key and Deleting Shadow Copy<\/figcaption><\/figure>\n<p>It has also tried to move laterally to other hosts in the network by checking the IP address assigned to the system.Once the IPv4 Address belongs to the range of 172.16. or 192.168. (Private IPv4 addresses typically assigned in LAN environment), it will then send the \u201cIcmpEchoRequest\u201d packet using the \u201cIcmpSendEcho\u201d API to target IPv4 address, instead of using the native ping command.<\/p>\n<p>If it has access to that host\/system which is available online in LAN, it will encrypt those systems as well. For the encryption process, it has used a combination of RSA-2048 bit and AES-256-bit, it will generate different AES keys for each file using the \u201cCryptGenKey\u201d API.<\/p>\n<figure id=\"attachment_88568\" aria-describedby=\"caption-attachment-88568\" style=\"width: 296px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88568 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-15-Generating-AES-256-bit-Using-CryptGenKey.png\" alt=\"\" width=\"296\" height=\"209\" \/><figcaption id=\"caption-attachment-88568\" class=\"wp-caption-text\">Fig 14:Generating AES 256 bit Using CryptGenKey<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>After file encryption it will write marker \u201cHERMES\u201d in the file, to identify if the file has encrypted or not. Ryuk is the successor to Hermes Ransomware as they have a similarity in most of its implementation. It will append the encrypted AES key in Microsoft SIMPLEBLOB format to the footer of the file.<\/p>\n<figure id=\"attachment_88569\" aria-describedby=\"caption-attachment-88569\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88569 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/02\/Fig-16-Encrypted-File-Structure-650x361.png\" alt=\"\" width=\"650\" height=\"361\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-16-Encrypted-File-Structure-650x361.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-16-Encrypted-File-Structure-300x166.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-16-Encrypted-File-Structure-768x426.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-16-Encrypted-File-Structure-789x438.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/02\/Fig-16-Encrypted-File-Structure.png 874w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-88569\" class=\"wp-caption-text\">Fig 15:Encrypted File Structure<\/figcaption><\/figure>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>By using WoL and Ping scanning APIs to wake up the system and move laterally in-network, Ryuk has tried to encrypt the maximum number of systems. These features signify the focus of this ransomware to increase its monetization by infecting as many systems as possible.<\/p>\n<p>Ryuk was initially associated with the APT Group and remained undetected for months\u00a0\u00a0and one day it evolves\u00a0 to encrypt all network devices, and now with WoL, it wakes up the system in LAN to increase its success of encrypting a larger number of systems.<\/p>\n<p><strong>How Quick Heal protects its users from such attacks:<\/strong><\/p>\n<p>Quick Heal products are built with the following multi-layered security that helps counter such attacks.<\/p>\n<p><strong>\u00a0 \u00a0 1. Anti-Ransomware<\/strong><\/p>\n<p>Specially designed to counter ransomware attacks, this feature detects ransomware by tracking its execution sequence.<\/p>\n<p><strong>\u00a0 \u00a0 2. Firewall<\/strong><\/p>\n<p>Blocks malicious attempts to breach network connections.<\/p>\n<p><strong>\u00a0 \u00a0 3. IDS\/IPS<\/strong><\/p>\n<p>Detects RDP brute force attempts and blocks the remote attacker IP for a defined period.<\/p>\n<p><strong>\u00a0 \u00a0 4.Virus Protection<\/strong><\/p>\n<p>Online virus protection service detects the known variants of the ransomware.<\/p>\n<p><strong>\u00a0 \u00a0 5. Behaviour-based Detection System<\/strong><\/p>\n<p>Tracks the activity of executable files and blocks malicious files.<\/p>\n<p><strong>\u00a0 \u00a0 6. Back-Up and Restore<\/strong><\/p>\n<p>Helps you take regular backups of your data and restore it whenever needed.<\/p>\n<p><strong>IoC:<\/strong><\/p>\n<p>987336D00FDBEC3BCDB95B078F7DE46F<\/p>\n<p><strong>Detection name:<\/strong><\/p>\n<p>Trojan.HermezRI.S10666632<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Security Labs recently came across a variant of Ryuk Ransomware which contains an additional feature of identifying and encrypting\u00a0systems\u00a0in a Local Area Network (LAN). This sample targets the systems which are present in sleep as well as the online state in the LAN. This sample is packed with a custom packer. The final [&hellip;]<\/p>\n","protected":false},"author":68,"featured_media":88548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1671,171,910],"tags":[49,50],"class_list":["post-88547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-encryption","category-enterprise","category-ransomware","tag-malware","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88547"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=88547"}],"version-history":[{"count":20,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88547\/revisions"}],"predecessor-version":[{"id":88586,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88547\/revisions\/88586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/88548"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=88547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=88547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=88547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}