{"id":91915,"date":"2023-08-18T15:57:23","date_gmt":"2023-08-18T10:27:23","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91915"},"modified":"2023-08-18T16:46:11","modified_gmt":"2023-08-18T11:16:11","slug":"darkrace-ransomware-a-deep-dive-into-its-techniques-and-impact","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/darkrace-ransomware-a-deep-dive-into-its-techniques-and-impact\/","title":{"rendered":"DarkRace Ransomware: A Deep Dive into its Techniques and Impact"},"content":{"rendered":"<p>As cyber threats continue to evolve, a new ransomware has been discovered bearing unmistakable similarities to another well-known ransomware variant, Lockbit.<\/p>\n<p>It is noteworthy to point out that Lockbit\u2019s source code was leaked around a year ago, making it possible for other threat actors to potentially develop new variants based on this. Therefore, the discovery of this new ransomware, referred to as &#8216;DarkRace&#8217; demonstrates how cybercriminals leverage existing resources to create their own malicious software.<\/p>\n<p>In this blog analysis, we delve into the intricate details of this clever integration and bring to light the technical specifics involved, as well as the potential implications for unsuspecting victims.<\/p>\n<h2><strong>Technical Analysis:<\/strong><\/h2>\n<p>On initial execution, the DarkRace ransomware checks for the mutex name \u201cCheckMutex.\u201d In case it is not found, it creates a new one. This is used to avoid the reinfection.<\/p>\n<figure id=\"attachment_91916\" aria-describedby=\"caption-attachment-91916\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91916 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/1_Checking-the-existing-Mutex-object-650x165.png\" alt=\"\" width=\"650\" height=\"165\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Checking-the-existing-Mutex-object-650x165.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Checking-the-existing-Mutex-object-300x76.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Checking-the-existing-Mutex-object-768x196.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Checking-the-existing-Mutex-object-789x201.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Checking-the-existing-Mutex-object-150x38.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/1_Checking-the-existing-Mutex-object.png 982w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91916\" class=\"wp-caption-text\"><em>Fig1: Checking the Existing Mutex Object<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91929\" aria-describedby=\"caption-attachment-91929\" style=\"width: 637px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91929 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/2_Decrypted-XML-format-String.png\" alt=\"\" width=\"637\" height=\"370\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Decrypted-XML-format-String.png 637w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Decrypted-XML-format-String-300x174.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/2_Decrypted-XML-format-String-150x87.png 150w\" sizes=\"(max-width: 637px) 100vw, 637px\" \/><figcaption id=\"caption-attachment-91929\" class=\"wp-caption-text\"><em>Fig2: Decrypted XML Format String<\/em><\/figcaption><\/figure>\n<p>After creating the Mutex it decrypts the XML format string with XORing with hardcoded value.<\/p>\n<p>The XML Format string contains the following,<\/p>\n<ul>\n<li>A List of Extension, Folders And files to be Whitelisted.<\/li>\n<li>Services and Processes to be killed.<\/li>\n<li>Calls to delete the shadow copy.<\/li>\n<li>Ransom Note and an ICO.<\/li>\n<\/ul>\n<figure id=\"attachment_91928\" aria-describedby=\"caption-attachment-91928\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91928 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/3_Content-of-XML-Format-string-650x166.png\" alt=\"\" width=\"650\" height=\"166\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Content-of-XML-Format-string-650x166.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Content-of-XML-Format-string-300x76.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Content-of-XML-Format-string-768x196.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Content-of-XML-Format-string-789x201.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Content-of-XML-Format-string-150x38.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/3_Content-of-XML-Format-string.png 1009w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91928\" class=\"wp-caption-text\"><em>Fig3: Content for XML Format String<\/em><\/figcaption><\/figure>\n<p>After decrypting the data, it deletes the shadow copies from the system, after which it retrieves the command from the decrypted data and executes it using the WinExec() API.<\/p>\n<figure id=\"attachment_91927\" aria-describedby=\"caption-attachment-91927\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91927 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/4_Deleting-the-shadow-copy-650x81.png\" alt=\"\" width=\"650\" height=\"81\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Deleting-the-shadow-copy-650x81.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Deleting-the-shadow-copy-300x37.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Deleting-the-shadow-copy-768x96.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Deleting-the-shadow-copy-789x99.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Deleting-the-shadow-copy-150x19.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/4_Deleting-the-shadow-copy.png 857w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91927\" class=\"wp-caption-text\"><em>Fig4: Deleting the Shadow Copy<\/em><\/figcaption><\/figure>\n<p>It then retrieves Services and Processes from the decrypted XML data with respect to XML tags as shown in the image below. This terminates processes and stops services.<\/p>\n<figure id=\"attachment_91926\" aria-describedby=\"caption-attachment-91926\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91926 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/5_Retrieves-services-form-the-XML-data-650x179.png\" alt=\"\" width=\"650\" height=\"179\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Retrieves-services-form-the-XML-data-650x179.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Retrieves-services-form-the-XML-data-300x83.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Retrieves-services-form-the-XML-data-304x84.png 304w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Retrieves-services-form-the-XML-data-150x41.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/5_Retrieves-services-form-the-XML-data.png 734w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91926\" class=\"wp-caption-text\"><em>Fig5: Retrieves Services from the XML Data<\/em><\/figcaption><\/figure>\n<p>The services are then disabled using Windows Service Control Manager (SCM) API function. Further, it retrieves the names of the processes and proceeds to terminate them by using the &#8216;Taskkill&#8217; command.<\/p>\n<figure id=\"attachment_91925\" aria-describedby=\"caption-attachment-91925\" style=\"width: 588px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91925 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/6_Uses-Taskkill-to-kill-the-Process.png\" alt=\"\" width=\"588\" height=\"253\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Uses-Taskkill-to-kill-the-Process.png 588w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Uses-Taskkill-to-kill-the-Process-300x129.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/6_Uses-Taskkill-to-kill-the-Process-150x65.png 150w\" sizes=\"(max-width: 588px) 100vw, 588px\" \/><figcaption id=\"caption-attachment-91925\" class=\"wp-caption-text\"><em>Fig6: Uses Taskkill to kill the Process<\/em><\/figcaption><\/figure>\n<p><strong>Encryption Process:<\/strong><\/p>\n<p>Firstly, it enumerates the drives and then passes the thread further for the whitelisted folder, files and ext. If the content passes all checks, it gets encrypted.<\/p>\n<figure id=\"attachment_91924\" aria-describedby=\"caption-attachment-91924\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91924 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/7_Gets-the-drives-650x131.png\" alt=\"\" width=\"650\" height=\"131\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Gets-the-drives-650x131.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Gets-the-drives-300x60.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Gets-the-drives-768x155.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Gets-the-drives-789x159.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Gets-the-drives-150x30.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/7_Gets-the-drives.png 854w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91924\" class=\"wp-caption-text\"><em>Fig7: Gets the Drives<\/em><\/figcaption><\/figure>\n<p>Once the drives are obtained, they are enumerated based on their drive type. Subsequently, each drive is passed to a separate thread for further processing. The responsibility of this thread is to perform two checks:<\/p>\n<ol>\n<li>File size<\/li>\n<li>And file extension whitelisting<\/li>\n<\/ol>\n<p>It checks if the file size is less than equal to 1 KB, and discards them from further encryption process as shown in the images given below.<\/p>\n<figure id=\"attachment_91923\" aria-describedby=\"caption-attachment-91923\" style=\"width: 651px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91923 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/8_File-name-and-File-size-checks.png\" alt=\"\" width=\"651\" height=\"171\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_File-name-and-File-size-checks.png 651w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_File-name-and-File-size-checks-300x79.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/8_File-name-and-File-size-checks-150x39.png 150w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><figcaption id=\"caption-attachment-91923\" class=\"wp-caption-text\"><em>Fig8: File Name and File Size Checks<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91922\" aria-describedby=\"caption-attachment-91922\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91922 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/10_Checking-for-the-whitelisted-files-650x116.png\" alt=\"\" width=\"650\" height=\"116\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Checking-for-the-whitelisted-files-650x116.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Checking-for-the-whitelisted-files-300x54.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Checking-for-the-whitelisted-files-768x137.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Checking-for-the-whitelisted-files-150x27.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/10_Checking-for-the-whitelisted-files.png 773w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91922\" class=\"wp-caption-text\"><em>Fig9: Checking for Whitelisted Files<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_91921\" aria-describedby=\"caption-attachment-91921\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91921 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/9_Checking-for-the-whitelisted-ext-650x123.png\" alt=\"\" width=\"650\" height=\"123\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Checking-for-the-whitelisted-ext-650x123.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Checking-for-the-whitelisted-ext-300x57.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Checking-for-the-whitelisted-ext-768x145.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Checking-for-the-whitelisted-ext-150x28.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/9_Checking-for-the-whitelisted-ext.png 772w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91921\" class=\"wp-caption-text\"><em>Fig10: Checking for Whitelisted Extensions<\/em><\/figcaption><\/figure>\n<p>After checking the whitelisted files, extension and checks on file size, it then passes to the Encryption. Here, it uses Salsa 20 for File Encryption.<\/p>\n<figure id=\"attachment_91930\" aria-describedby=\"caption-attachment-91930\" style=\"width: 604px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91930 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/11_Encrypted-Files-with-Extension-1352FF327.png\" alt=\"\" width=\"604\" height=\"194\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Encrypted-Files-with-Extension-1352FF327.png 604w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Encrypted-Files-with-Extension-1352FF327-300x96.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/11_Encrypted-Files-with-Extension-1352FF327-150x48.png 150w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><figcaption id=\"caption-attachment-91930\" class=\"wp-caption-text\"><em>Fig11: Encrypted Files with Extension \u201d1352FF327<\/em><\/figcaption><\/figure>\n<p><strong>Ransom Note:<\/strong><\/p>\n<figure id=\"attachment_91920\" aria-describedby=\"caption-attachment-91920\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91920 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/12_Ransom-Note-650x336.png\" alt=\"\" width=\"650\" height=\"336\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Ransom-Note-650x336.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Ransom-Note-300x155.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Ransom-Note-768x397.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Ransom-Note-789x408.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Ransom-Note-150x78.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/12_Ransom-Note.png 1055w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91920\" class=\"wp-caption-text\"><em>Fig 12: Ransom Note<\/em><\/figcaption><\/figure>\n<p><strong>Post Encryption:<\/strong><\/p>\n<p>Upon successful encryption, DarkRace ransomware deletes event-logs, kills the tasks and deletes all the dropped files.<\/p>\n<figure id=\"attachment_91919\" aria-describedby=\"caption-attachment-91919\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91919 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/13_Deleting-the-Event-logs-650x172.png\" alt=\"\" width=\"650\" height=\"172\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Deleting-the-Event-logs-650x172.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Deleting-the-Event-logs-300x79.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Deleting-the-Event-logs-768x203.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Deleting-the-Event-logs-789x209.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Deleting-the-Event-logs-150x40.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/13_Deleting-the-Event-logs.png 896w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91919\" class=\"wp-caption-text\"><em>Fig13: Deleting the Event Logs<\/em><\/figcaption><\/figure>\n<p>It uses the &#8220;taskkill&#8221; command, which is a Windows cmd-line tool that is used to terminate running processes. By using this command with the image name parameter, the ransomware forcefully terminates the process.<\/p>\n<figure id=\"attachment_91918\" aria-describedby=\"caption-attachment-91918\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91918 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/14_Use-of-Taskkill-650x88.png\" alt=\"\" width=\"650\" height=\"88\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Use-of-Taskkill-650x88.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Use-of-Taskkill-300x40.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Use-of-Taskkill-768x103.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Use-of-Taskkill-789x106.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Use-of-Taskkill-150x20.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/14_Use-of-Taskkill.png 913w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-91918\" class=\"wp-caption-text\">Fig14: Use of Taskkill<\/figcaption><\/figure>\n<figure id=\"attachment_91917\" aria-describedby=\"caption-attachment-91917\" style=\"width: 565px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91917 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/08\/15_Deleting-the-files-and-restart-the-system.png\" alt=\"\" width=\"565\" height=\"142\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Deleting-the-files-and-restart-the-system.png 565w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Deleting-the-files-and-restart-the-system-300x75.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/08\/15_Deleting-the-files-and-restart-the-system-150x38.png 150w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><figcaption id=\"caption-attachment-91917\" class=\"wp-caption-text\"><em>Fig15: Deleting the Files &amp; Restarting the System<\/em><\/figcaption><\/figure>\n<p>Finally, it deletes the bat-file, the executable and forcefully restarts the system. Deleting the bat file and executable is a common tactic employed by ransomware actors to remove its own traces and prevent analysis by security researchers.<\/p>\n<h2><strong>Conclusion:<\/strong><\/h2>\n<p>The integration of Lockbit\u2019s techniques into DarkRace shows how cyber attackers are using proven methods to enhance their attacks and cause heightened damage. Such a combination of tactics could potentially lead to increased infections, compromised data and higher ransom demands. All this highlights the pressing need for robust cybersecurity measures, and the urgency of staying vigilant and proactive in the face of ever-evolving threats.<\/p>\n<h3><strong>Tips to prevent such kinds of attacks <\/strong><\/h3>\n<ul>\n<li>Regularly update your operating system, applications, and software to fix any known vulnerabilities that are often exploited by ransomware.<\/li>\n<li>Use security software that can protect the system from the latest threats.<\/li>\n<li>Be cautious with email attachments especially from unknown senders. Avoid clicking on suspicious links or downloading files from untrusted sources.<\/li>\n<\/ul>\n<h3><strong>Quick Heal Protection:<\/strong><\/h3>\n<ul>\n<li>DarkRace.S230221325<\/li>\n<\/ul>\n<h3><strong>IOCs:<\/strong><\/h3>\n<p>CB1C423268B1373BDE8A03F36F66B495<\/p>\n<p>1933FED76A030529B141D032C0620117<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Co-Author:<\/strong><\/p>\n<p><strong>Soumen Burma<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As cyber threats continue to evolve, a new ransomware has been discovered bearing unmistakable similarities to another well-known ransomware variant, Lockbit. It is noteworthy to point out that Lockbit\u2019s source code was leaked around a year ago, making it possible for other threat actors to potentially develop new variants based on this. Therefore, the discovery [&hellip;]<\/p>\n","protected":false},"author":60,"featured_media":91931,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1660,24,1495,599,1191,1],"tags":[1851,1982,1361,1315,1362,1994,1923,50],"class_list":["post-91915","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advisory","category-malware","category-nransomware","category-tech-2","category-tech-terms","category-uncategorized","tag-cyberrisks","tag-ransomware-cybersecurity","tag-antivirus","tag-antivirus-software","tag-cybercrime","tag-darkrace","tag-quickheal","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91915"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91915"}],"version-history":[{"count":7,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91915\/revisions"}],"predecessor-version":[{"id":91968,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91915\/revisions\/91968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91931"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}