Cyber Crime

Exmatter exfiltration tool used to implement new extortion tactics

Ransomware operators switch to new extortion tactics by using the Exmatter malware and adding new data corruption functionality.

The data extortion landscape is constantly evolving and threat actors are devising new extortion techniques, this is the case of threat actors using the Exmatter malware.

Cyderes Special Operations and Stairwell Threat Research researchers spotted a sample of malware classified as the .NET exfiltration tool Exmatter. The malware was observed in conjunction with the deployment of BlackCat/ALPHV ransomware, which experts believe is run by affiliates of numerous ransomware groups, including BlackMatter.

Exmatter allows operators to exfiltrate specific file types from selected directories before the ransomware itself is executed on the compromised systems. The sample analyzed by the experts attempts to corrupt files within the victim’s environment, rather than encrypting them, and executes actions to prepare the files for destruction.

Experts pointed out that this is the first time the Exmatter tool was observed using a destructive module.

“First, the malware iterates over the drives of the victim machine, generating a queue of files that match a hardcoded list of designated extensions. Files matching those file extensions are added to the queue for exfiltration, which are then written to a folder with the same name as the victim machine’s hostname on the actor-controlled server.” ” reads the report published by Cyderes. “As files upload to the actor-controlled server, the files that have been successfully copied to the remote server are queued to be processed by a class named Eraser. A randomly sized segment starting at the beginning of the second file is read into a buffer and then written into the beginning of the first file, overwriting it and corrupting the file.”

Using legitimate data from one exfiltrated file to corrupt another file could allow operators to evade ransomware or wiper heuristic-based detection, additionally, copying file data from one file to another is a much more benign functionality than sequentially overwriting files with random data or encrypting them.

Experts pointed out that developing stable, secure, and fast ransomware to encrypt files is a redundant and costly behavior compared to corrupting files and using the exfiltrated copies for data recovery.

Eliminating data encryption makes the process faster and eliminates the risk of not getting the full payout, or that the victim will find flaws in the encryption process that could allow them to decrypt the data.

According to the experts, the data destruction capabilities of Exmatter are still under development due to the following evidence:

  • The second file’s chunk length, which is used to overwrite the first file, is randomly decided and could be as short as one byte long.
  • There is no mechanism for removing files from the corruption queue, meaning that some files may be overwritten numerous times before the program terminates, while others may never have been selected.
  • The function that instantiates the Eraser class, named Erase, does not appear to be fully implemented and does not decompile correctly.

The data corruption feature detailed by Stairwell and  Cyderes researchers may represent a shift in the strategy used by ransomware affiliates.

The report also includes Yara rules for this threat and MITRE ATT&CK.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, ransomware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Czech Republic accuses China’s APT31 of a cyberattack on its Foreign Ministry

The Czech government condemned China after linking cyber espionage group APT31 to a cyberattack on…

5 hours ago

New PumaBot targets Linux IoT surveillance devices

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…

9 hours ago

App Store Security: Apple stops $2B in fraud in 2024 alone, $9B over 5 years

Apple blocked over $9B in fraud in 5 years, including $2B in 2024, stopping scams…

10 hours ago

Crooks use a fake antivirus site to spread Venom RAT and a mix of malware

Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading…

14 hours ago

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks<gwmw style="display:none;"></gwmw>

Iranian man pleads guilty to role in Baltimore ransomware attack tied to Robbinhood, admitting to…

15 hours ago

DragonForce operator chained SimpleHelp flaws to target an MSP and its customers

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…

1 day ago