ARTICLE
18 November 2022

Relic Project: A New Threat Group Or Rebranded Ransomware?

AC
Ankura Consulting Group LLC
Contributor
Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
A ransom note, UNLOCK_FILES.793DF82AFCB81B75.txt, appeared on computers throughout a company and when triaging what happened, encrypted files were observed.
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

A ransom note, UNLOCK_FILES.793DF82AFCB81B75.txt, appeared on computers throughout a company and when triaging what happened, encrypted files were observed. The ransom note (shown below) gave specific instructions as to what was happening, details on how to resolve the problem and a link where to contact them.

1252158a.jpg

A typical ransomware response was initiated, and forensic analysis was completed. An unpatched FortiGate appliance, which controlled Remote Desktop Protocol (RDP) access for users, was found to be the likely entry point into the environment. 

This vulnerability allows any user to connect without having to authenticate, allowing access and granting administrator privileges. This access was leveraged and a user account was created that had a similar name to that of a legitimate administrator account. PSEXESVC was executed which let users execute processes on remote systems without the need to have any kind of client software present on the remote computers. The threat actors used RDP to find the domain controller which became the hub of their activity. 

Cobalt Strike was executed which has the ability to create connections (using Cobalt Strike servers) to compromise networks and create persistent channels between the target and the attackers. In this instance "Cobalt Strike" was renamed "rsmvc.dll" which was run from the domain controller. Also, "klink.exe" was executed on the domain controller which is a free telnet/ssh client for Windows. Connections to most systems in the environment was done via RDP.

The threat actor was in the environment for five days before an attempt to launch the ransomware payload. File 793DF82AFCB81B75.64.exe was executed but only ran for 30 seconds before terminating. The threat actor downloaded an .exe to .msi program and ran 793DF82AFCB81B75.64.msi but it also terminated after 30 seconds. The threat actor created a batch file named "start.bat" which appeared to copy "793DF82AFCB81B75.64" to every server. Also, a batch file named "rmd.bat" was run. This allowed the threat actor to update the configuration for the endpoint software.

Scheduled tasks were created to automate the ransomware deployment but that too was unsuccessful. As the ransom note and encrypted files were discovered, the threat actor was blocked. Some files were encrypted but a large majority were not.

Key Takeaways

  1. It is believed that there was no C2 beaconing due to the direct connection via telnet and RDP.
  2. There was no forensic evidence that indicated what data was exfiltrated from the environment.
  3. Unpacking and analyzing the malware did not reveal anything with a unique signature.
  4. The ransomware appeared to be generic, possibly an edited version of a previous variant.
  5. Initial negotiations with this group indicated they may be new due to not having an active "shame" site and trouble with them configuring their direct chat channel.

After a few weeks, they had their "shame" active and had posted victim data. All victim data that was posted appeared to be from current victims. There was no historical data as is observed with other sites.

793DF82AFCB81B75.64.exe (MD5 1f61c4e1e363f44094432045b2251497)

793DF82AFCB81B75.64.msi (MD5 19d7382e3e9069b1fc6e9629f2ccf0b4)

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

ARTICLE
18 November 2022

Relic Project: A New Threat Group Or Rebranded Ransomware?

United States Technology
Contributor
Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More