Thanos Ransomware which targeted an attack on State-run organizations in the Middle East and North Africa on July 6 and July 9, 2020, seems to be active again as per a recent study reported by the Cyble security research team. 

Cyble team claims to found the blog on the darkweb during their regular threat hunting operations that were hosted by the Prometheus ransomware group. It was affiliated itself with the REvil Ransomware group. 

source: Cyble

Technical Analysis on Thanos Ransomware

As per the researchers, the Thanos Ransomware is a 32-bit .NET executable that is highly obfuscated. Upon decompiling malware files, they found it difficult to reverse the files as they contained non-readable codes in them. Cyble team used a de-obfuscation tool to read the contents of the malware file but it was unsuccessful. Also, when they tried to decompile the files found that data object that contained multiple base64 strings and few plain strings helped to track the activities of the ransomware.

On running the program, they have found that only document files and database files were found to be encrypted by Thanos Ransomware. Then the modified Thanos ransomware contained interesting strings which are related to document extension, persistence file names, system information, and various other extension files.

source: Cyble

After one-by-one checking the process, it was observed that ransomware started and stopped various services as below, 

Services:          

  • Dnscache – Used for client-side DNS resolution for the faster DNS query. 
  • FDRsePub – Makes computers and resources visible in the network. 
  • SSDPSRV – Discovers networked devices. 
  • Upnphost – Discovering universal plug and play devices. 

Here, the critical services are stopped by the ransomware for various reasons which include disabling Antivirus, Backup and system restore and database backup and restore, the main purpose of these services is getting stopped by ransomware to run its process of encryption without any interruptions on the victim.  In addition, to start and stop the services, Thanos ransomware uses SC (Service Control) command to permanently change the service configuration.  

Also, the ransomware terminates the various running process using taskkill.exe, as these files can be targeted for the ransomware encryption process, where some of the process files include excel.exe, steam.exe, thunderbird.exe, msaccess.exe, steam.exe, etc.,  

Firewall rules will be changed to open various ports and allow outbound connections from other systems.

And obfuscation technique is used during ransomware runtime so it loads the reversed base64 encoded string which contains information of the registry path.

Path: “SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options”.  

The ransomware encryption is started after disabling the AV, backup and restore, and changing the firewall rules. Thanos ransomware uses the AES encryption technique, and after the encryption, infected files are appended with the file extension: “.LZG-ZNM-YDNM”. And the ransom notes are dropped as below.  

source: Cyble

Recommendations:  

This Ransomware group will emerge in the new future, so it’s better to get ourselves protected from this ransomware and follow the best practices as below, 

  1. Use MFA to secure the RDP connections for access. 
  2. Always check for instances of standard executables with the hash of another process. 
  3. Using separate administrative accounts on the administration workstations and implementing the Local administrator password solutions (LAPS). 
  4. Unnecessary services to be deactivated from Organization workstations and configuring the firewall configuration on the workstations to block any unwanted connection requests. 
  5. Always keep the endpoint security tools updated with the latest and signatures in it.

Indicators of Compromise (IoCs):

Sha256

  • 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc  
  • a787997af509035b1e84f3cde7f8d62c1e02e8cc368fb95402783a0ed50f33f8  
  • 3605b9af44b153ef39a5bbe6d98ab8e6ef58b1f0f1c76eca4a3fb9b9a4042605  
  • c2a01ef5115f2d41dffa1b1a697d1d05b2b9532a70552473aab36d8e4dda7928  
  • d662580e70711ba15f0bc65096a2298801ee7bc373ced3eb59582a637aeeb5fd  
  • e9388ca092c87f310a159e03d3dd97b3ce79cd6cc642a7f3b057d0fa3dcde42c  
  • 5c66963cf7d417ffe475afdf18906df5c6dcd8dbbb1462918f197323dabb6f19  
  • e15f9169021b5e11381547d57a952b98e06f6366161d56083ff9be69fc43e9bf  
  • fdf8c15f27cfbf534cbc9771e3d4e42632a5993bb4b08f444111147ec540e273  
  • c76825aeaa7960e44bda9786efbcbb6e7865ef9f27fa6931e566aa44d88ad9cd  
  • 27ba35dbeb5324bd780ae6a95c5aae93fcb47c5aa8f48b1c21f83000a55de2da  
  • 785fdf2e6765a7b8870bd0b40d3e944536315604babfe30a7ca3466c02e411fe  
  • 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc  
  • 2eb10ec6fa0d6d3f02a362ad5cbd55da6df47d23cfbacc3bc5a549e761cef7c8  
  • b6f774f46949d54a060dabf2d7d08eef9fd390091f419ce1a2b555bcd58b2d32  
  • e56cbdd422dda00fe75d80d0491195a3c42bade324ffebd913dcab29f741b9f6  
  • 0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454  
  • e5211ef62f023a71cd5aa493f788198c2b97d6f79854f6e5f399893430e5ad0e  
  • ef97bf49a9bd00a994143852590cc3a2d20227e510dc2b5968704d8f100b4d3c  
  • 8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7  
  • 9d9897d274e7a9ba3037d450dc6833c679e9ef8d125bd9d8b0329213df45b9e3  
  • 9d85a74f073c4403e3a91017b6757e0368139e672498a2f84f5efaad0d1b573b  
  • ba6fbc352cc9a89771ca33901729dff8d1181a76f711ab74a61fb35df3bf8a19  
  • 1d4db8733c5f11ee8fca530aeb4a91069de04b1af64cbe1fa3ae2d3572a6e554  
  • 1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb  
  • 48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698  
  • 1136907e76399f1d76694ee9c540b387ed6a5b12340b60f3fabfc183bca457df  
  • 714f630043670cdab4475971a255d836a1366e417cd0b60053bf026551d62409  
  • a0e20c580e8a82f4103af90d290f762bd847fadd4eba1f5cd90e465bb9f810b7  
  • e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3  
  • 20d9efe472c01a0a23c9764db679b27a4b6a4d72e697e3508e44f218b8b952f5  
  • aa3e530d4567c1511126029fac0562ba8aa4ead0a01aceea169ade3e38a37ea7  
  • 83e2ba9faf075547be65d2b6dbd13e190a0b1c1cf626788cb756ab7a3c770dcb  
  • 4e747c7024d9a76e22a31d38aee9408749023fc65b917c6d9ac05dd3afc3f36f
  • 9e573ba20b55f6149d801491c0ebb51c9f1c954b956a2f6cea6f18af68f0164b  
  • 6e016c4d1db409b5e499289f31bcb6b87b5c46b29d4fcba4a50a7b68d733b93e  
  • 8b55f596d8179b043f050f42bc7c079d07be918fe321805aff1a00f88dd8f06d  
  • b9acf82471bc22c7ce444684759d7506d407286989141028a2621a0b0f535094  
  • ea55c78b15e2045f26ea39db122acb9a5cca84ba97625f444054f3efa331b386  
  • 113230f881d7008fad3d62e34ce79f1b9273f604303f1b5c1450cff6481655de  
  • a88db6dc88a37a79056f466c6e0878569715409c5387be4947789cc924a97b92  
  • 3caa5163083177d40dd9ec2c3b84d0b37c82e2ee9807a50338af89f132a354d9  
  • 5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d  
  • 0cfed709f1954141a3c5a363e4e95d7e5b546ef310cfb9a63f0ca20ccc6ed152  
  • 2033194ab3c2602eb9d3b31eeb5432514c423eac213f1219e5865dfee371ed58  
  • a5a544ef213bc2e02937fa7e0967a4b6ba926b9f5b3485dd108e232521155bf7  
  • 5fb35d559259cd85537265346901bb52083090489266608cef0a1c85de214aed  
  • ad6b792c1e886156cd81586205a81aa92b9f256bd57cbcc527d194ae3f1b53d0  
  • 52f7f9e8369a3e89899d40e89766c9642b137b25bfd58a2b564dac67a40445f3  
  • 899f48bad035165acf8869af63922619f8a901bbeb8a7fc13919ba90dd9e7768  
  • 2d3d1b83067859ebb118ff1a99ac098806b65f566df094fad9a4debef4da911d  
  • f4773540eb06fbde9a23f03424b3722999d0e6efabf5009c94c1bb0911626ada  
  • b3b1cfa71b1cc572dace69e0996d537f41632ec4bab5b1f376d66aa765928b5f  
  • 67c29db79904510822a97c5e887606676c5cf77f5c31d60420d1d0ce9403daa3  
  • 8d268be58a27d2c980b807ffe703ea28b0fd0cd1ba2e455902faebe9ec17c52e  
  • d7f7ea6cb92e1f01e815007fdcdf2455680e739077aff7e3eaf51311cf3388a5  
  • 5eedadeabe3b12131cdbc04c7af3927bd3d09add1d0725bce5db024d5102fb96  
  • 02665fcf9c0ddfb2cd3e04d254f60c5a4453947f7c3df5480316a040c0c8686f.

By Michael

Writer of Infohaunt is an Cyber Security Professional have experience in SOC operations, Threat Management, Incident Response, Threat Hunting, Digital Forensics.