Jump to content

“Bad Rabbit” ransomware strikes Ukraine and Russia. Attack resembles WannaCry and Petya

Sources: BBC, VirusTotal, Securelist 

 

Quote

 bad_rabbit_ransomware_01.png 

A new strain of ransomware nicknamed "Bad Rabbit" has been found spreading in Russia, Ukraine and elsewhere. The malware has affected systems at three Russian websites, an airport in Ukraine and an underground railway in the capital city, Kiev. The cyber-police chief in Ukraine confirmed to the Reuters news agency that Bad Rabbit was the ransomware in question.

 

It bears similarities to the WannaCry and Petya outbreaks earlier this year.

Meanwhile, US officials said they had "received multiple reports of Bad Rabbit ransomware infections in many countries around the world". The US computer emergency readiness team said it "discourages individuals and organisations from paying the ransom, as this does not guarantee that access will be restored".

"According to our data, most of the victims targeted by these attacks are located in Russia," said Vyacheslav Zakorzhevsky at Kaspersky Lab.

 

"We have also seen similar but fewer attacks in Ukraine, Turkey and Germany."

Bad Rabbit encrypts the contents of a computer and asks for a payment - in this case 0.05 bitcoins, or about $280 (£213).

Cyber-security firms, including Russia-based Kaspersky, have said they are monitoring the attack.

I know news about a new malware strain isn’t particularly interesting but I posted this as more of a PSA as the attack method is via drive by download meaning it doesn’t require user interaction to execute it. All it needs is to have the user browse an infected website. 

Quote

How is it different to ExPetr? Or it is the same malware?

Our observations suggest that this been a targeted attack against corporate networks, using methods similar to those used during the ExPetr attack.

 

Technical details

According to our telemetry, the ransomware is spread via a drive-by attack.

The ransomware dropper is distributed from hxxp://1dnscontrol[.]com/flash_install.php

bad_rabbit_ransomware_02.png

Also according to our telemetry data, victims are redirected to this malware web resource from legitimate news websites.

The downloaded file named install_flash_player.exe needs to be manually launched by the victim. To operate correctly, it needs elevated administrative privileges which it attempts to obtain using the standard UAC prompt. If started, it will save the malicious DLL as C:\Windows\infpub.dat and launch it using rundll32

 

The executable dispci.exe appears to be derived from the code base of the legitimate utility DiskCryptor. It acts as the disk encryption module which also installs the modified bootloader and prevents the normal boot-up process of the infected machine.

An interesting detail that we noticed when analyzing the sample of this threat: it looks like the criminals behind this malware are fans of the famous books & TV show series Game Of Thrones. Some of the strings used throughout the code are the names of different characters from this series.

bad_rabbit_ransomware_07.png

bad_rabbit_ransomware_08.png

It seems that the attack is more localized than a global pandemic. With that said, at the time I’m posting this, 43 out of 66 anti virus programs are now detecting it (including Windows Defender) which is good. Make sure to have your AV programs up to date and enable cloud protection for faster protection. Also, it’s a good idea to use standard accounts instead of admin accounts. 

7C5E256B-E54B-40AB-85A4-D2C618471CB8.thumb.png.ea9411286fc14014fa140d0309772a54.png

 

Edited by hey_yo_

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

damn i almost hoped for another WannaCry to give the world another bitch slap to teach them to update their shit

I spent $2500 on building my PC and all i do with it is play no games atm & watch anime at 1080p(finally) watch YT and write essays...  nothing, it just sits there collecting dust...

Builds:

The Toaster Project! Northern Bee!

 

The original LAN PC build log! (Old, dead and replaced by The Toaster Project & 5.0)

Spoiler

"Here is some advice that might have gotten lost somewhere along the way in your life. 

 

#1. Treat others as you would like to be treated.

#2. It's best to keep your mouth shut; and appear to be stupid, rather than open it and remove all doubt.

#3. There is nothing "wrong" with being wrong. Learning from a mistake can be more valuable than not making one in the first place.

 

Follow these simple rules in life, and I promise you, things magically get easier. " - MageTank 31-10-2016

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, Bananasplit_00 said:

damn i almost hoped for another WannaCry to give the world another bitch slap to teach them to update their shit

Well the Bad Rabbit ransomware doesn’t require user interaction as it uses a drive by download attack where all you need is to browse an infected website not to mention those infected sites are actually legit news sites. 

Edited by hey_yo_

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, hey_yo_ said:

Well the Bad Rabbit ransomware doesn’t require user interaction as it uses a drive by download attack where all you need is to browse an infected website not to mention those infected sites are actually legit news sites. 

It actually does require user interaction....
 

Quote

The downloaded file named install_flash_player.exe needs to be manually launched by the victim. To operate correctly, it needs elevated administrative privileges which it attempts to obtain using the standard UAC prompt. If started, it will save the malicious DLL as C:\Windows\infpub.dat and launch it using rundll32

You'd only be screwed if UAC wasn't a thing in Vista and above.

"We also blind small animals with cosmetics.
We do not sell cosmetics. We just blind animals."

 

"Please don't mistake us for Equifax. Those fuckers are evil"

 

This PSA brought to you by Equifacks.
PMSL

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Dabombinable said:

It actually does require user interaction....
 

You'd only be screwed if UAC wasn't a thing in Vista and above.

My bad. Good catch.

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×