Malware

DeathRansom ransomware evolves encrypting files, but experts identified its author

DeathRansom was considered fake ransomware due to the fact that it did not implement an effective encryption process, but now things are changing.

DeathRansom is a ransomware family that was initially classified as a joke because it did not implement an effective encryption scheme.

Researchers at Fortinet published an analysis that shows the threat evolving, it is now capable of encrypting files using strong encryption.

The experts pointed out that the ransomware is distributed in an efficient campaign and it was able to infect new victims on a daily basis for the past two months.

The DeathRansom ransomware was first spotted in November 2019, but at the time it was just a harmless code.

The first samples were only adding a file extension to all of a user’s files without encrypting them and they were dropping a ransom note on the victims’ computers.

The malware attempted to trick the victims into thinking that their systems were infected with ransomware.

Now the DeathRansom code was evolved and the latest versions effectively encrypt the files using a combination of the “Curve25519 algorithm for the Elliptic Curve Diffie-Hellman (ECDH) key exchange scheme, Salsa20, RSA-2048, AES-256 ECB, and a simple block XOR algorithm.

Experts from Fortinet also focused their investigation on the alleged author of the ransomware. The presence of certain strings in the source code of the DeathRansom and the analysis of the websites distributing the threat allowed the exports to link the ransomware to a malware operator that was very active in the last years.

The operator was involved in campaigns distributing multiple password stealers, including Vidar, Azorult, Evrial, 1ms0rryStealer, and miners like SupremeMiner.

Files names and paths observed in numerous campaigns conducted by the operator revealed a link to the scat01 and SoftEgorka nicknames, the vitasa01[@]yandex.ru email address, a Russian phone number, and the gameshack[.]ru website.

The researchers identified a series of profiles on Iandex.Market, YouTube, Skype, VK, Instagram, and Facebook that were linked to the Russian citizen Egor Nedugov, living in Aksay, a small Russian town near Rostov-on-Don.

“Once we searched for “scat01” and “vidar” on the Russian underground forums, we found a person with the same nickname providing a review (in Russian) of the Vidar stealer” reads the report published by Fortinet.

“The name “Egor” corresponds to one of the underground nicknames, “SoftEgorka,” and the surname “Nedugov” corresponds to the Skype account “nedugov99”. According to the profile, this individual lives in Rostov-on-Don. Remember that the Yandex review made by scat01 was done from Aksay – a small town near Rostov-on-Don.”

Fortinet experts several online profiles used by the same actor, some of which were not included in their report.

According to the experts, the same individual was responsible for phishing attacks and scam attempts on his forum mates.”

“According to information on underground forums, this person is responsible for account stealing, carding, malware distribution, and even the phishing and scamming of his forum mates. That is why nearly all his accounts on underground forums were eventually banned.” continues the report.

Currently, DeathRansom is being distributed via phishing campaigns.

“FortiGuard Labs established a significant connection between the ongoing DeathRansom and Vidar malware campaigns. They share the naming pattern and infrastructure used. We also found evidence that a Vidar sample tried to download the DeathRansom malware.” concludes the report.

“We believe that an actor with the nickname scat01 could beresponsible for the latest DeathRansom attack, as well as other malicious attacks. We also found evidence of strong Russian roots in the malware being distributed. Based on the evidence left on Russian underground forums, we were able to find a person who seems to likely to be behind these malicious campaigns.”

Additional technical details, including indicators of compromise (IoCs), are reported in the analysis published by Fortinet.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – DeathRansom ransomware, malware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Two flaws in vBulletin forum software are under attack

Experts found two vulnerabilities in the vBulletin forum software, one of which is already being…

14 hours ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 47

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

16 hours ago

Security Affairs newsletter Round 526 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

18 hours ago

Two Linux flaws can lead to the disclosure of sensitive data

Qualys warns of two information disclosure flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise…

2 days ago

Meta stopped covert operations from Iran, China, and Romania spreading propaganda

Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…

2 days ago

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…

3 days ago