SentinelLabs researchers have observed the first Linux variant of the Clop ransomware. The researchers noticed that the encryption algorithm implemented in the ELF executable is flawed and can allow victims to decrypt locked files without paying a ransom.
The researchers observed the first ELF variant of the Clop ransomware targeting Linux systems on December 26, 2022. The experts found many similarities between Windows and Linux variant, including the same encryption method and similar process logic.
The sample was likely part of a bigger attack that hit the University in Colombia (sample1, sample2, sample3, sample4, sample5) on around the December 24, 2022. The cybercrime group behind the attack leaked the data stolen from the victim on January 5, 2022.
“It appears to be in its initial development phases as some functionalities present in the Windows versions do not currently exist in this new Linux version.” reads the report published by the experts. “A reason for this could be that the threat actor has not needed to dedicate time and resources to improve obfuscation or evasiveness due to the fact that it is currently undetected by all 64 security engines on VirusTotal.”
Clop ransomware gang has been active since February 2019, it targeted many organizations and universities over the years. Like other ransomware gangs, Clop operators implemented a double-extortion model leaking on their leak sites the data stolen from the victims that refused to pay the ransom.
In November 2021, six alleged affiliates with the Clop ransomware operation were arrested in an international joint law enforcement operation, named Operation Cyclone, led by Interpol.
The experts noticed that the Linux variant targets specific folders, subfolders and all files/types and doesn’t use a hashing algorithm, such as the Windows variant, in order to avoid encrypting specific folders and files.
SentinelOne discovered a flaw in the ransomware-encryption logic implemented in the Linux variant, which was found containing a hardcoded RC4 “master-key.” During the execution of the main function the master-key is copied into the global variable szKeyKey.
Below is the sample’s RC4 “master-key”:
“During the file encryption phase, the ransomware – similar to the Windows version – generates a 0x75 bytes size RC4 key, with the use of a lookup table and a PRNG byte. This generated RC4 key is used to encrypt the mappedAddress and write it back to the file.” continues the report. “Then by using the RC4 “master-key” the ransomware encrypts the generated RC4 key and stores it to $filename.$clop_extension. By using a symmetric algorithm (second RC4) to “encrypt” the file’s RC4 key, we were able to take advantage of this flaw and decrypt Cl0p-ELF encrypted files.”
The Linux variant of the Clop ransomware drops a .txt ransom note (i.e. “README_C_I_0P.TXT”) on the infected machines.
“We know that Cl0p operations have shown little if no slow-down since the disruption in June 2021. While the Linux-flavored variation of Cl0p is, at this time, in its infancy, its development and the almost ubiquitous use of Linux in servers and cloud workloads suggests that defenders should expect to see more Linux-targeted ransomware campaigns going forward.” concludes the report.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, ransomware)