{"id":90568,"date":"2021-11-24T16:32:35","date_gmt":"2021-11-24T11:02:35","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=90568"},"modified":"2023-02-15T16:29:13","modified_gmt":"2023-02-15T10:59:13","slug":"anydesk-software-exploited-to-spread-babuk-ransomware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/anydesk-software-exploited-to-spread-babuk-ransomware\/","title":{"rendered":"Anydesk Software Exploited to Spread Babuk Ransomware"},"content":{"rendered":"\r\n<p>We generally see that <a href=\"https:\/\/blogs.quickheal.com\/ransomware-attacks-erupt-via-cyberpunk-2077\/\">ransomware attacks<\/a> are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office documents. Attackers trick the unsuspecting users into enabling macros, etc. Apart from these usual attack techniques, we came across a new way of using Anydesk software fake websites to spread Babuk ransomware. Anydesk is a remote-control tool that allows users to access remote computers and other devices running the host applications. <br \/>Babuk Ransomware is recently very active. Its tactics for encryption are not much different from other ransomware families. Over time, ransomware releases new variants and improves its attack mechanisms to target new victims.<\/p>\r\n<figure id=\"attachment_90572\" aria-describedby=\"caption-attachment-90572\" style=\"width: 891px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-90572\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture1.png\" alt=\"\" width=\"891\" height=\"204\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture1.png 891w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture1-300x69.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture1-650x149.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture1-768x176.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture1-789x181.png 789w\" sizes=\"(max-width: 891px) 100vw, 891px\" \/><figcaption id=\"caption-attachment-90572\" class=\"wp-caption-text\">Fig 1. Initial Vector of infection<\/figcaption><\/figure>\r\n<p>When the user tries to download the Anydesk software from an unknown suspicious link, a fake website appears, which allows you to download Anydesk software. This fake website looks like the original Anydesk website. When the user clicks for downloading Anydesk software, ransomware is also downloaded as it is bundled with Anydesk software in the form of a self-extracting archive (in this case, it is in no setup files). It does so for evasion purposes.<\/p>\r\n<p>For, e.g., If Anydesk is searched in Microsoft or Bing, we get the following result. The first website is not related to the official Anydesk application, and After clicking on the setelog website, ads.htm redirects to a malicious website that downloads ransomware.<\/p>\r\n<figure id=\"attachment_90577\" aria-describedby=\"caption-attachment-90577\" style=\"width: 664px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90577 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture2-1.png\" alt=\"\" width=\"664\" height=\"523\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture2-1.png 664w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture2-1-300x236.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture2-1-495x390.png 495w\" sizes=\"(max-width: 664px) 100vw, 664px\" \/><figcaption id=\"caption-attachment-90577\" class=\"wp-caption-text\">Fig 2. Searching Anydesk application<\/figcaption><\/figure>\r\n<p>Similarly, we have found one more suspicious link for the Anydesk application, which is mentioned below.<br \/>URL: <br \/><strong><em>https[:]\/\/Anydesk1[.]websiteseguro[.]com\/downloads\/windows\/?_ga=2.165501695.1936674747.1628634255-780551265.1627305233<\/em><\/strong><br \/>Downloaded File Name: Setup_Anydesk.exe<br \/><br \/><\/p>\r\n<figure id=\"attachment_90579\" aria-describedby=\"caption-attachment-90579\" style=\"width: 506px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-90579\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture3.png\" alt=\"\" width=\"506\" height=\"400\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture3.png 506w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture3-300x237.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture3-493x390.png 493w\" sizes=\"(max-width: 506px) 100vw, 506px\" \/><figcaption id=\"caption-attachment-90579\" class=\"wp-caption-text\">Fig 3. After Clicking on the downloaded file, an installation window appears<\/figcaption><\/figure>\r\n<p>We analyzed the downloaded archive and discovered that it has a clean Anydesk setup along with a Babuk downloader, a RAT file, and a REG file.<\/p>\r\n<figure id=\"attachment_90581\" aria-describedby=\"caption-attachment-90581\" style=\"width: 434px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-90581\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture4.png\" alt=\"\" width=\"434\" height=\"261\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture4.png 434w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture4-300x180.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture4-250x150.png 250w\" sizes=\"(max-width: 434px) 100vw, 434px\" \/><figcaption id=\"caption-attachment-90581\" class=\"wp-caption-text\">Fig 4. Files present inside an archive<\/figcaption><\/figure>\r\n<p><strong>Understanding the Infection Process<\/strong><br \/>When a user clicks on the downloaded archive, which pretends to be an Anydesk software application, other files in the bundle get dropped silently. The above image shows an Allakore Rat client named bthudtaskt.exe, a Babuk downloader called mdnsFULLHD.exe, and one registry file named Anydesk. Reg is fallen in the Startup folder without user interaction. Clean Anydesk application is dropped at the desktop, and it gets installed. All the dropped files in the startup folder are executed through PowerShell and their activity in the background.<\/p>\r\n<p><strong>Anydesk.Reg:<\/strong><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90584\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture5.png\" alt=\"\" width=\"788\" height=\"245\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture5.png 788w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture5-300x93.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture5-650x202.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture5-768x239.png 768w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><br \/>Anydesk. reg file disables user account control by setting the value of EnableLUA by 0. It also disables windows defender by setting the value of DisableAntiSpyware by 1. Malware also disables real-time protection by setting values by 1.<\/p>\r\n<p><br \/><strong>Allakore RAT Client:<\/strong><br \/>AllaKore Rat is an open-source simple Remote Access Tool written in Delphi and has a very high resemblance with code found on GitHub.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90585\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture6.png\" alt=\"\" width=\"696\" height=\"372\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture6.png 696w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture6-300x160.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture6-650x347.png 650w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><br \/>Babuk Downloader launches the Allakore Rat, and it makes TCP requests, as shown below.<\/p>\r\n<p><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90586\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture7.png\" alt=\"\" width=\"387\" height=\"193\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture7.png 387w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture7-300x150.png 300w\" sizes=\"(max-width: 387px) 100vw, 387px\" \/><br \/><br \/><strong>Babuk Downloader:<\/strong><br \/>The &#8216;mdnsFULLHD.exe&#8217; file is PE32 executable for MS Windows, and it is Delphi compiled. It is immense (~ 12MB) as it has most of the code to impair the defences. It launches the Allakore Rat \u00f9sing PowerShell cmdlet Set-preference, making TCP requests as shown above image.<br \/>It adds the below paths in exclusion for the Windows Defender modules through the PowerShell cmdlet Set-MpPreference to hide all the malware components from Windows Defender.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90588\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture8.png\" alt=\"\" width=\"792\" height=\"422\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture8.png 792w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture8-300x160.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture8-650x346.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture8-768x409.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture8-789x420.png 789w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/><\/p>\r\n<p><br \/>For eg: <br \/>cmd.exe \/c PowerShell -Command Add-MpPreference -ExclusionPath &#8220;C:\\Users\\XXX\\Contacts&#8221;<br \/>cmd.exe \/c PowerShell -Command Add-MpPreference -ExclusionPath &#8220;C:\\Users\\XXX\\Links&#8221; etc<br \/>Above are excluded by executing cmd.exe. The malware also excludes the below drives.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90589\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture9.png\" alt=\"\" width=\"703\" height=\"130\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture9.png 703w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture9-300x55.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture9-650x120.png 650w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><br \/>It has a list of AVs, as shown below, and it checks if any of the antivirus product is installed in the system.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90590\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture10.png\" alt=\"\" width=\"224\" height=\"269\" \/><\/p>\r\n<p><br \/>If any antivirus processes are running on the system, the below prompt appears, asking the user to intervene and uninstall the product. If the user clicks on the Next button, the control panel opens for uninstalling the software, and in the background, the malware checks whether it is uninstalled.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90591\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture11.png\" alt=\"\" width=\"433\" height=\"344\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture11.png 433w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture11-300x238.png 300w\" sizes=\"(max-width: 433px) 100vw, 433px\" \/><\/p>\r\n<p>The malware disables Task manager, and it undermines all the modules of Windows Defender. <br \/>Further digging into the file revealed that malware sent an HTTP request to download the bat file and .exe file. The domain used are:<br \/><em>&#8220;hxxp:\/\/suporte01928492.redirectme.net\/Update7\/Update.bat.rar&#8221;<\/em><br \/><em>&#8220;hxxp:\/\/suporte01928492.redirectme.net\/Update7\/Update.exe.rar&#8221;<\/em><br \/>These downloaded files are saved in:<br \/>&#8220;C:\\Users\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup&#8221; folder. Malware creates these files and names according to the user name and then executes both the files silently using PowerShell.<br \/>Files created: .exe and .bat<br \/>E.g., if the username is ABC, the file name is ABC.exe and ABC.bat in the folder mentioned above.<br \/><br \/><strong>Update.bat<\/strong><\/p>\r\n<ul>\r\n<li>It contains the following setting, which is executed through PowerShell, which help in evasion of the malware:<\/li>\r\n<li>Hide per-user toggle notifications<\/li>\r\n<li>Hide notification of windows defender in the systray icon<\/li>\r\n<li>Disable dialogue prompt.<\/li>\r\n<li>Cascade elevation.<\/li>\r\n<\/ul>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-90594\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture14.png\" alt=\"\" width=\"1065\" height=\"449\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture14.png 1065w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture14-300x126.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture14-650x274.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture14-768x324.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture14-789x333.png 789w\" sizes=\"(max-width: 1065px) 100vw, 1065px\" \/><\/p>\r\n<p><br \/><strong>Update.exe: BABUK PAYLOAD<\/strong><br \/>Downloaded Update.exe file is a Babuk ransomware payload. It is UPX packed file, and the size is small, around 25 KB. Malware is compiled in C\/C++.<br \/>After execution, it launches the vssadmin.exe process to delete all Shadow Copy using the command &#8220;vssadmin.exe delete shadows \/all \/quiet.&#8221; It also creates &#8220;mutex&#8221; with the name &#8220;DoYouWantToHaveSexWithChuongDong&#8221; in the system.<br \/>Malware closes all the processes that are listed, which prevents file encryption. It also empties the Recycle Bin by calling the function SHEmptyRecycleBinA(), and it enumerates system folders and drives and creates ransom notes in each folder.<\/p>\r\n<figure id=\"attachment_90592\" aria-describedby=\"caption-attachment-90592\" style=\"width: 1021px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-90592\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture12.png\" alt=\"\" width=\"1021\" height=\"443\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture12.png 1021w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture12-300x130.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture12-650x282.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture12-768x333.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture12-789x342.png 789w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><figcaption id=\"caption-attachment-90592\" class=\"wp-caption-text\">Fig . Ransom Note<\/figcaption><\/figure>\r\n<p>It encrypts all files by the extension &#8220;.doydo&#8221;. An extension may vary according to the payload variant downloaded.<\/p>\r\n<figure id=\"attachment_90595\" aria-describedby=\"caption-attachment-90595\" style=\"width: 596px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-90595\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/11\/Picture13.png\" alt=\"\" width=\"596\" height=\"384\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture13.png 596w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/11\/Picture13-300x193.png 300w\" sizes=\"(max-width: 596px) 100vw, 596px\" \/><figcaption id=\"caption-attachment-90595\" class=\"wp-caption-text\">Fig. Encrypted files<\/figcaption><\/figure>\r\n<p>Malware appends the string &#8220;choung dong looks like a hot dog!!&#8221; at the end of the encrypted content of all the encrypted files.<br \/><br \/>After a successful attack, if the victim does not pay the ransom as demanded, the malware author either publishes the encrypted data or sells it on underground forums.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>Conclusion:<\/strong><\/h3>\r\n<p>This use case is not limited to a specific threat actor. However, we believe that this type of infection is affecting a wide range of Anydesk users. Using tools like Anydesk or other administrative agencies, the malware authors can easily take administrative privileges of the victim&#8217;s computer and perform the malicious activity in the system. <br \/>In the end, we emphasize the customer to be very careful while clicking on links that are used for software download or any link received by email, messages, or WhatsApp. Always check whether the website is official and secure or not.<br \/>Here are a few additional guidelines that will help minimize the attack surface &amp; possible damage to IT infrastructure.<\/p>\r\n<ul>\r\n<li>Avoid downloading software from untrusted P2P or torrent sites. In most cases, they harbour malicious software. In this case, use <strong>https:\/\/Anydesk.com\/en\/downloads<\/strong> to download Anydesk software.<\/li>\r\n<li>Always keep your security software (antivirus, firewall, etc.) up to date to protect your computer from new variants of malware.<\/li>\r\n<li>Do not download cracked\/pirated software, as they risk backdoor entry for malware into your computer.<\/li>\r\n<li>Audit&#8217; Local \/Domain Users&#8217; and remove\/disable unwanted users.<\/li>\r\n<li>Don&#8217;t assign Administrator privileges to users.<\/li>\r\n<li>Wherever possible, enable multi-Factor authentication to ensure all logins are legitimate.<\/li>\r\n<li>Don&#8217;t stay logged in as an administrator unless it is strictly necessary.<\/li>\r\n<li>Avoid browsing, opening documents, or other regular work activities while logged in as an administrator.<\/li>\r\n<li>While signature-based protections alone are insufficient to detect and prevent sophisticated ransomware attacks designed to evade traditional protections, they are an essential component of a comprehensive security posture.<\/li>\r\n<li>Respond carefully &amp; sensibly to the alerts raised by Behavioral-based detection systems and Anti- Ransomware Protection systems. We prefer to block\/Deny unknown applications detected by these systems.<\/li>\r\n<li>Audit RDP access &amp; disable it if not required. Else, set appropriate rules to allow access from only specific &amp; intended Hosts.<\/li>\r\n<li>In almost all cases, attackers use PowerShell scripts to exploit the vulnerability, so disable the PowerShell in the Network. If you require PowerShell for internal use, then try to block the PowerShell.exe connecting to public access.<\/li>\r\n<li>Always use a combination of online and offline backup of all your files.<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<h2 style=\"font-size: 27px;\"><strong><b>How Quick Heal Protect its Users:<\/b><\/strong><\/h2>\r\n<p><a href=\"https:\/\/www.quickheal.co.in\/home-users\/\">Quick Heal products<\/a> are equipped with multi-layered detection technologies like IDS\/IPS, EDR, DNA Scan, Email Scan, NGAV, Web Protection, and Patented Anti Ransomware detection. This multi-layered security approach helps us protect our customers against Babuk Ransomware and other known, unknown threats.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h4><strong><b>Indicators of compromise<\/b><\/strong><\/h4>\r\n<p><strong><b>Anydesk Innosetup files:<\/b><\/strong><\/p>\r\n<ul>\r\n<li>a64beabdb0c9ae6b5dca97b64bbd0358<\/li>\r\n<li>d7751f57dca53de35be58c45e623ba54<\/li>\r\n<li>b70fb92fadc90efca375850ed503af4d<\/li>\r\n<li>225fcb613c1796a3f27a2b71aba77dc4<\/li>\r\n<li>23c9916a932d3c3b03d9ebee5c2bd6eb<\/li>\r\n<li>d443a25c6a4f9c553724da404676dee4<\/li>\r\n<li>a0b78a347b3e8b1b17a3db6dda4079e3<\/li>\r\n<li>d0af75fc8c88a51b044dad9bfa2cbd17<\/li>\r\n<li>33dd883776eda150f4bdfebe97f00790<\/li>\r\n<li>ea34fea96cbbc22091aab8c6a4225326<\/li>\r\n<li>5763a24e3927c6053bb216b09d281c13<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><strong><b>Domains:<\/b><\/strong><\/p>\r\n<ul>\r\n<li>myftp.biz<\/li>\r\n<li>sytes.net<\/li>\r\n<li>redirectme.net<\/li>\r\n<li>sytes.net<\/li>\r\n<li>serveirc.com<\/li>\r\n<li>websiteseguro.com\/downloads\/windows\/?_ga=2.165501695.1936674747.1628634255-780551265.1627305233<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><strong><b>Babuk Downloader:<\/b><\/strong><\/p>\r\n<ul>\r\n<li>4935463e3f1f0e498f5928d579405725<\/li>\r\n<li>4e376b65f35727c956782874d2777549<\/li>\r\n<li>64c97cda282fdf8f5906f98d8b5e83d0<\/li>\r\n<li>85deb376e4c3559ce010c8e9a4a6595c<\/li>\r\n<li>a5d17bf427f8630e207564b3888af127<\/li>\r\n<li>ad4461b7b14faa0dc2b77dbd95ab4330<\/li>\r\n<li>aeef6cefcf78c8990a09eee89d831c7f<\/li>\r\n<li>db4572ff504436ffb079ef5858176deb<\/li>\r\n<li>Ead98682c4b5da91fa6380f1858cf8c4<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><strong><b>Allakore Rat Client:<\/b><\/strong><\/p>\r\n<ul>\r\n<li>1486cbb9b4ff1c5aceb67949eefa8cda<\/li>\r\n<li>1bcbc44772aba8c5dd27b964e555a490<\/li>\r\n<li>207ffd69134a589bbb5e24949664234a<\/li>\r\n<li>2719bd7ab3de7b683041cd7c30f1041d<\/li>\r\n<li>2f860f69a4090e9f6bf0833dc322ff77<\/li>\r\n<li>304275544920ab64fc3d17e2c1a30fd7<\/li>\r\n<li>3e45570f7b33f0f4c24bcc7b24b31d85<\/li>\r\n<li>44c696374426167febbc290b8cd1b300<\/li>\r\n<li>45d7c902614f094a846dea70b31bb846<\/li>\r\n<li>4fc57386bfc22265a507adb818ef163e<\/li>\r\n<li>65f7a1e438a33ec75adbc599d2362706<\/li>\r\n<li>83020fda9cd8bc429a4141284ba41b21<\/li>\r\n<li>c4a047327be1a3a481083cecbcc1c54d<\/li>\r\n<li>d387a74efbb033c1d327a5e1c4a9e6ce<\/li>\r\n<li>e5313dd64ce118e49e1dfd461af26835<\/li>\r\n<li>F555a28a88f91ec639e5d86bc4c1c3c9<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><strong><b>Babuk Payload:<\/b><\/strong><\/p>\r\n<ul>\r\n<li>0099963e7285aeafc09e4214a45a6a210253d514cbd0d4b0c3997647a0afe879<\/li>\r\n<li>028facff67136de55fe200177a190da625c8e1713b4e7d95bf5fc5412a5afffc<\/li>\r\n<li>0294114d5f411b6c47eb255d4ed6865df99d1c5252f4f585aabf44e6cbacaa59<\/li>\r\n<li>02e9883501635da9b501e715bb827a0b9d0c265991f1263f073eb6c5d9b335c3<\/li>\r\n<li>03110baa5aad9d01610293f2b8cd21b44cc7efa0a465e677d6b3f92510a4b1d7<\/li>\r\n<li>0b93a024b5d6874d7bb69abd7f0e2d54a67c602584575a9b6d1212baae81442f<\/li>\r\n<li>12c561ac827c3f79afff026b0b1d3ddec7c4b591946e2b794a4d00c423b1c8f8<\/li>\r\n<li>15656e1825383c4749fadcc46f9825df6262ca2f1f98d895d64c840febe3d9d3<\/li>\r\n<li>18e282e6806903ff00a78b91f6d0ad1bc3aae4b4846d6a5705c036a88138605f<\/li>\r\n<li>1ab45a508da655ef755ad4394f869c664f664b3ac111875704a583e9485f2238<\/li>\r\n<li>1d40f42fa328a9a6192d4fa8c6e5ce6f813ea9132774784521713b202d772994<\/li>\r\n<li>1deb1efad2c469198aabbb618285e2229052273cf654ee5925c2540ded224402<\/li>\r\n<li>1e24560100d010c27cc19c59f9fe1531e4286ecb21fe53763165f30c5f58dc90<\/li>\r\n<li>63b6a51be736d253e26011f19bd16006d7093839b345363ef238eafcfe5e7e85<\/li>\r\n<\/ul>\r\n","protected":false},"excerpt":{"rendered":"<p>We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office documents. Attackers trick the unsuspecting users into enabling macros, etc. Apart from these usual attack techniques, we came across a new way of using Anydesk software fake websites to spread Babuk ransomware. Anydesk is a remote-control tool [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":90601,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[910,5,1],"tags":[1884,1885,49,50],"class_list":["post-90568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-security","category-uncategorized","tag-babuk","tag-babuklocker-darkweb","tag-malware","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90568"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=90568"}],"version-history":[{"count":19,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90568\/revisions"}],"predecessor-version":[{"id":91418,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90568\/revisions\/91418"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/90601"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=90568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=90568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=90568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}