Notification
This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this bulletin or otherwise.
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see http://www.us-cert.gov/tlp.
Summary
Description
Two (2) artifacts were submitted for analysis. The analysis indicates that these files are ransomware.
For a downloadable copy of IOCs, see:
Submitted Files (2)
5d65ebdde1aef8f23114f95454287e7410965288f144d880ece2a2b8c3128645 (prelecturedexe.exe)
d8d919d884b86e4d5977598bc9d637ed53e21d5964629d0427077e08ddbcba68 (proteusdlll.dll)
Findings
5d65ebdde1aef8f23114f95454287e7410965288f144d880ece2a2b8c3128645
Tags
ransomwaretrojan
Details
Name | prelecturedexe.exe |
---|---|
Size | 1024512 bytes |
Type | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
MD5 | 222d7fde37ae344824a97087d473cdcd |
SHA1 | 90205a2761ed7ac3b188230786ec2bebd30effba |
SHA256 | 5d65ebdde1aef8f23114f95454287e7410965288f144d880ece2a2b8c3128645 |
SHA512 | 177f25c2e454b5366719a5536e25dbf16ab5cb01b1886b18ea1477671651191cbf663cf1754990c618be1d7c36bf523aaac8528d94a1d49583213dc8a0dee98a |
ssdeep | 24576:PLvqxk7+y/4NmWPWKrbE6qqE56Hglx8zudJhTyGwcKe:+ |
Entropy | 4.695794 |
Antivirus
Ahnlab | Trojan/Win32.MSILKrypt |
---|---|
Antiy | Trojan/Win32.Dynamer |
Avira | TR/Runner.egvkh |
BitDefender | Gen:Variant.Kazy.368437 |
Cyren | W32/Trojan.XCIK-1629 |
ESET | a variant of MSIL/Runner.N trojan |
Emsisoft | Gen:Variant.Kazy.368437 (B) |
Ikarus | Trojan.MSIL.Runner |
K7 | Trojan ( 0053adaa1 ) |
McAfee | Generic.dyp |
Microsoft Security Essentials | Trojan:MSIL/Runner |
Quick Heal | Trojan.IGENERIC |
Sophos | Mal/Kryptik-BV |
Symantec | Trojan.Gen.2 |
Zillya! | Trojan.Runner.Win32.876 |
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2018-09-16 03:31:51-04:00 |
---|---|
Import Hash | f34d5f2d4577ed6d9ceec516c1f5a744 |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
5e1317af9956be12deebdea49aae14f5 | header | 512 | 2.723403 |
124120a6b861fdfff756e19a77a53e05 | .text | 1020928 | 4.695157 |
8a2d72fec9d2535440e0f83b59253f2b | .rsrc | 2560 | 3.722300 |
b227291feae10a83e762c2bc9d959a7f | .reloc | 512 | 0.101910 |
Packers/Compilers/Cryptors
Microsoft Visual C# v7.0 / Basic .NET |
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 488 | (388) |
5d65ebdde1aef8f23114f95454287e7410965288f144d880ece2a2b8c3128645.exe | 1976 | (2556) |
dw20.exe | 1936 | (1976) |
Relationships
5d65ebdde1… | Related_To | d8d919d884b86e4d5977598bc9d637ed53e21d5964629d0427077e08ddbcba68 |
Description
This file is a 32-bit Windows executable. The file has been identified as ransomware written in C Sharp (C#). It contains a namespace named “prelecturedexe” and a class named “Program.”
This ransomware is invoked using the following command-line format:
— Begin command format —
prelecturedexe.exe <argv0> <argv1> <argv2> <argv3>
— End command format —
The execution will quit if 4 arguments are not used.
This ransomware uses Advanced Encryption Standard (AES) encryption. When executed, it uses a command-line argument <argv0> as a component for the AES Rijndael Key and initialization vector (IV). <argv1> <argv2> <argv3> are files and directories to be encrypted/decrypted.
It reads a file named “*.nike2018” in the same directory where this executable resides. If the file “*.nike2018” does not exist, the execution quits. It removes “*.nike2018” after it reads the file content.
d8d919d884b86e4d5977598bc9d637ed53e21d5964629d0427077e08ddbcba68
Tags
ransomwaretrojan
Details
Name | proteusdlll.dll |
---|---|
Size | 409600 bytes |
Type | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows |
MD5 | fe3ae84a8defc809e734bbd0736f82de |
SHA1 | 04a2ea4c78f78d628800c0a5cb9547a0c0b14378 |
SHA256 | d8d919d884b86e4d5977598bc9d637ed53e21d5964629d0427077e08ddbcba68 |
SHA512 | 9cb6ddb8a0b9329fe08fcf8a02d45c43222432d6e145f55deacb019f772970513d3ddfa589a002c0abf190fa8712d41e08aab51836685aed9bf30d118ea00a5e |
ssdeep | 3072:Sa6J+OIazQ94ZPaqa7YHmIZwUSToQemTIC6:A+OIa094ZPRakH/+USE |
Entropy | 4.645654 |
Antivirus
Ahnlab | Trojan/Win32.MSILKrypt |
---|---|
Antiy | Trojan/MSIL.Runner |
Avira | TR/Runner.pjtvf |
BitDefender | Gen:Variant.Ursu.265937 |
ClamAV | Win.Ransomware.Samsam-6482588-0 |
Cyren | W32/Trojan.NADV-8499 |
ESET | a variant of MSIL/Runner.N trojan |
Emsisoft | Gen:Variant.Ursu.265937 (B) |
Ikarus | Trojan.MSIL.Runner |
K7 | Trojan ( 0053adaa1 ) |
McAfee | RDN/Generic.dx |
Microsoft Security Essentials | Trojan:MSIL/Runner |
Quick Heal | Trojan.IGENERIC |
Sophos | Troj/Kryptik-IS |
Symantec | Trojan.Gen.2 |
Zillya! | Trojan.Runner.Win32.880 |
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2018-09-16 03:31:51-04:00 |
---|---|
Import Hash | dae02f32a21e03ce65412f6e56942daa |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
397b763d106b2f347c5a563922273551 | header | 512 | 2.714618 |
ad25e96cae2016331129ec4643535822 | .text | 406528 | 4.650477 |
01784b876d14b1384491318f8fce07d5 | .rsrc | 2048 | 2.987471 |
816849886aa28e56db0cd065fae38897 | .reloc | 512 | 0.101910 |
Packers/Compilers/Cryptors
Microsoft Visual C# / Basic .NET |
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 488 | (384) |
rundll32.exe | 3028 | (2984) |
Relationships
d8d919d884… | Related_To | 5d65ebdde1aef8f23114f95454287e7410965288f144d880ece2a2b8c3128645 |
Description
This dynamic link library (DLL) contains functions used by the ransomware “prelecturedexe.exe” (222d7fde37ae344824a97087d473cdcd).
It contains a namespace named “proteusdlll” and a class named “Class1.”
It contains functions to generate the AES Rijndael Key and IV, function to create the Rijndael decryptor and function to encrypt/decrypt victim’s files.
The AES Rijndael Key and IV is generated from the following predefined bytes and the first command line argument <argv0>.
— Begin predefined bytes to generate Rijndael Key and IV —
0x49
0x76
0x61
0x6E
0x20
0x4D
0x65
0x64
0x76
0x65
0x64
0x65
0x76
— End predefined bytes to generate Rijndael Key and IV —
Relationship Summary
5d65ebdde1… | Related_To | d8d919d884b86e4d5977598bc9d637ed53e21d5964629d0427077e08ddbcba68 |
d8d919d884… | Related_To | 5d65ebdde1aef8f23114f95454287e7410965288f144d880ece2a2b8c3128645 |
Recommendations
NCCIC would like to remind users and administrators to consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.
- Maintain up-to-date antivirus signatures and engines.
- Keep operating system patches up-to-date.
- Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
- Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
- Enforce a strong password policy and implement regular password changes.
- Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
- Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
- Disable unnecessary services on agency workstations and servers.
- Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
- Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
- Exercise caution when using removable media (e.g., USB thumbdrives, external drives, CDs, etc.).
- Scan all software downloaded from the Internet prior to executing.
- Maintain situational awareness of the latest threats and implement appropriate ACLs.
Additional information on malware incident prevention and handling can be found in NIST’s Special Publication 800-83, Guide to Malware Incident Prevention & Handling for Desktops and Laptops.
Contact Information
NCCIC continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.gov/forms/feedback/
Document FAQ
What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact US-CERT and provide information regarding the level of desired analysis.
What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact US-CERT and provide information regarding the level of desired analysis.
Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the NCCIC at 1-888-282-0870 or soc@us-cert.gov.
Can I submit malware to NCCIC? Malware samples can be submitted via three methods:
NCCIC encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on US-CERT’s homepage at www.us-cert.gov.