LV ransomware operators repurposed a REvil binary to launch a new RaaS
The LV ransomware operators repurposed a REvil binary to create their own strain and launch a ransomware-as-a-service (RaaS).
A threat actor known as LV ransomware gang is trying to enter the cybercrime arena, it repurposed a REvil binary almost to create their own strain and launch a ransomware-as-a-service (RaaS).
The Sodinokibi/REvil is one of the major ransomware operations in the threat landscape, if conducted many attacks against high-profile targets, including the meat processing giant JBS and US nuclear weapons contractor Sol Oriens.
REvil is a group operating out of Russia, the activity of the ransomware gangs was also discussed during the last G7 meeting.
G7 member states have called on Russia and other states to dismantle operations of ransomware gangs operating within their countries.
This week, experts from Secureworks, which tracks the REvil’s gang as GOLD SOUTHFIELD, discovered that another ransomware group, tracked by the security firm as GOLD NORTHFIELD, repurposed a REvil binary to launch its own RaaS.
The circumstance suggests multiple scenarios, REvil sold the source code to the LV ransomware gang, the LV ransomware gang stole the source code, or simply the two gangs shared the code as part of a new partnership.
“Secureworks® Counter Threat Unit
CTU experts have yet to spot any adv on underground forums related to the ransomware, but they noticed variations in partner and campaign IDs across LV configurations and the naming convention used by the new group, likely because the newborn gang is going to launch a RaaS.
The experts compared the source code of the LV ransomware and the REvil one and discovered that they have identical code structure and functionality. LV operators likely used a hex editor to modify the REvil’s binary and replaced the ransomware configuration bypassing the anti-tamper control implemented by REvil to ensure the integrity of the configuration.
“GOLD NORTHFIELD also had to generate a CRC32 hash of the updated encrypted configuration and then replace the hard-coded precalculated CRC32 hash stored in the binary with the updated configuration’s CRC32 hash.” continues the analysis. “These changes are necessary because the REvil code calculates the configuration’s CRC32 hash value at runtime and terminates if the calculated and hard-coded hashes do not match.”
Then GOLD NORTHFIELD could add the RC4 key used to encrypt the configuration, the CRC32 hash of the encrypted configuration, the length of the encrypted configuration, and the encrypted configuration itself to the REvil binary via the identified configuration section (.7tdlvx) in the defined order.
Upon accessing the ransom payment site, victims have to provide a key from the ransom note in a basic form.
CTU experts discovered three ransom payment Tor domains used by LV gang and reported in LV ransom notes. The domains successfully load the landing page, but attempting to submit the key from the ransom note the researchers received HTTP errors.
Secureworks experts also identified two LV ransomware leak sites that appear to be operated independently, but only one victim was listed on both sites. At the time of this writing, no sensitive data was published on them.
“It is too early in GOLD NORTHFIELD’s evolution to evaluate the threat it poses. The ability to repurpose the REvil binary suggests that the threat actors have technical capabilities. Additionally, the complexity required for this repurposing and the configuration variations across LV samples suggest that GOLD NORTHFIELD may have automated the process.” concludes the analysis.
Follow me on Twitter: @securityaffairs and Facebook
|
Pierluigi Paganini
(SecurityAffairs – hacking, LV ransomware)
The post LV ransomware operators repurposed a REvil binary to launch a new RaaS appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.