Detection Content: Scarab Ransomware

Scarab ransomware was spotted for the first time in June 2017 and had been reappearing with new versions since then. This ransomware is one of the many HiddenTear variants, an open source ransomware Trojan released in 2015. 

The recently discovered versions of ransomware use an improved RSA encryption method and add various extensions to infected files. Scarab ransomware interferes with alternate recovery methods, deleting the Windows Restore points and the Shadow Volume Copies that could be used to restore the affected files to their former states. Decryption without a unique key is impossible. Researchers observed it in multiple campaigns: adversaries send phishing emails to spread the malicious software, in several cases, they rented Necurs botnet for this purpose. 

Multiple variants of the ransomware continue to appear on the threat landscape. The last one has been spotted two weeks ago adding the .cov19 extension for encrypted files. New community threat hunting Sigma rule by Ariel Millahuel helps to uncover fresh samples of Scarab ransomware at the beginning of the encryption process: https://tdm.socprime.com/tdm/info/r5jiwlzXUXDk/kSGkVXIBjwDfaYjKlqfD/?p=1

The rule has translations for the following platforms:

SIEM: Azure Sentinel, ArcSight, QRadar, Splunk, Graylog, Sumo Logic, ELK Stack, RSA NetWitness, Logpoint, Humio, 

EDR: Windows Defender ATP, Carbon Black, Elastic Endpoint

MITRE ATT&CK:

Tactics: Impact

Techniques: Data Encrypted for Impact (T1486)

 

This week Ariel has published another community rule for ransomware detection. It spots characteristics of AKO Ransomware that is the new ransomware-as-a-service offering under development: https://tdm.socprime.com/tdm/info/kK3QDFpKJRyh/bubkWnIBv8lhbg_iB-75/#bubkWnIBv8lhbg_iB-75