appleid勒索(苹果病毒警告)
REvil(又名Sodinokibi)勒索病毒团伙近期活跃度非常高,上个月才加密并窃取了某计算机巨头企业机密数据的REvil,在本月又入侵了苹果代工厂要价5000万美元,堪称勒索病毒界的“劳模” 。
《3.25 亿!REvil 勒索团伙又出动,深信服 EDR 来给用户打个“勒索病毒预防针”》
深信服终端安全团队一直对REvil勒索病毒团伙的技术应用和模式发展进行深度追踪,同时捕获到了本次攻击事件中的勒索病毒母体,通过技术分析发现,REvil在免杀技术上做了部分改进,母体和组件都伪造了数字签名,通过文件释放和DLL调用的方式分级触发,并通过多层payload解密才得到功能代码 。
除此以外分析人员发现,本次的病毒文件与此前针对国内企业的病毒文件还存在一些细节差异,排除加密的目录关键字中不再包含"tencent fies","wechat files"等中国普遍使用的软件目录 。
技术分析REvil勒索病毒母体分为exe和DLL两个部分,都先封装在一个名为svchost.exe的可执行文件中,三个文件都伪造了数字签名,其中svchost.exe和MpSvc.dll用了同样的伪造签名,而MsMpEng.exe则伪造了微软的签名:
文章插图
双击运行svchost.exe后,会从资源中读取MsMpEng.exe和MpSvc.dll:
文章插图
将两个文件释放到temp目录下,并调用cmd,利用/c参数后台执行MsMpEng.exe:
文章插图
而MsMpEng.exe也没有实质性的恶意功能,只是加载了MpSvc.dll中的导出函数ServiceCrtMain():
文章插图
MpSvc.dll中解密了两层payload后开始执行恶意功能,首先从内存中解密出需要用到的字符资源合集:
文章插图
分别在HKEY_LOCAL_MACHINESOFTWARE和HKEY_LOCAL_USERSOFTWARE下查找注册表项BlackLivesMatter的x4WHjRs值,若不存在该值,则生成7位加密后缀,随后创建该键值,值设置为加密后缀:
文章插图
采集基本的主机信息,包括用户名、主机名、磁盘类型以及注册表项的值:
hKey = HKEY_LOCAL_MACHINESubkey = "SYSTEMCurrentControlSetservicesTcpipParameters"ValueName = "Domain"
hKey = HKEY_CURRENT_USERSubkey = "Control PanelInternational"ValueName = "LocaleName"
hKey = HKEY_LOCAL_MACHINESubkey = "SOFTWAREMicrosoftWindows NTCurrentVersion"ValueName = "productName"
创建互斥体,防止重复执行:文章插图
使用函数SHEmptyRecyclebinW清空回收站,并使用SetThreadExecutionState防止主机进入休眠状态:
文章插图
为自身进程提权:
文章插图
枚举出终端上的服务,查看服务名是否在以下列表中,有则进行删除:
"svc": ["sophos", "svc$", "sql", "mepocs", "vss", "backupбмукшефы", "veeam", "memtas"]
文章插图
【appleid勒索(苹果病毒警告)】遍历进程,查看是否存在以下进程,如有则终止:
"prc":["allegro","steam","xtop","ocssd","xfssvccon","onenote","isqlplussvc","msaccess","powerpnt","cad","sqbcoreservice","thunderbird","oracle","infopath","dbeng50","pro_comm_msg","agntsvc","thebat","firefox","ocautoupds","winword","synctime","tbirdconfig","mspub","visio","sql","ocomm","orcad","mydesktopservice","dbsnmp","outlook","cadence","excel","wordpad","creoagent","encsvc","mydesktopqos"]
文章插图
遍历目录进行加密,同时排除以下目录;与针对中国用户不同的是,排除的目录关键字中不再包含"tencent fies","wechat files"等中国普遍使用的软件目录:
"wht":{"fld":["google","windows.old","programdata","system volume information","application data","program files (x86)","intel","boot","$windows.~bt","tor browser","program files","windows","perflogs","$windows.~ws","msocache","appdata","mozilla"]
排除以下文件:"fls":["ntuser.ini","ntldr","bootmgr","ntuser.dat.log","ntuser.dat","thumbs.db","autorun.inf","bootfont.bin","desktop.ini","boot.ini","iconcache.db","bootsect.bak"]
排除以下后缀:"ext":["ldf","adv","shs","cmd","ico","msc","hlp","drv","lock","nls","theme","lnk","nomedia","diagcab","ics","bat","rtp","spl","wpx","idx","icl","dll","themepack","scr","msi","key","mpa","cab","prf","ps1","bin","msstyles","msu","cpl","ani","386","sys","diagpkg","exe","mod","rom","icns","hta","msp","ocx","diagcfg","cur","com","deskthemepack"]
在每个目录下释放勒索信息txt文件:文章插图
加密后修改主机桌面为标志性的蓝色背景:
文章插图
如果NET字段配置为True的时候(默认为false),将向C&C端发送受害主机基本信息和生成的Key,域名配置包含了1229个域名字符:
文章插图
加固建议1.日常生活工作中的重要的数据文件资料设置相应的访问权限,关闭不必要的文件共享功能并且定期进行非本地备份;
2.使用高强度的主机密码,并避免多台设备使用相同密码,不要对外网直接映射3389等端口,防止暴力破解;
3.避免打开来历不明的邮件、链接和网址附件等,尽量不要在非官方渠道下载非正版的应用软件,发现文件类型与图标不相符时应先使用安全软件对文件进行查杀;
4.定期检测系统漏洞并且及时进行补丁修复 。
- 营养均衡|家长常给孩子吃苹果,往往忽略地下苹果,有空做给孩子吃营养不输
- 孩子|曾经为了买苹果“卖肾”的少年,如今25岁了,现状让人不由感慨
- 苹果|原来孕期那种水果不仅安胎,还能从孕早期一直吃到生,胎儿很喜欢
- 睡眠不好|苹果水能缓解小儿积食?医生建议:要想脾胃好,这2物要少吃
- 父母|那个“卖肾”买苹果手机的高中生,现状如何?网友:赔上了一辈子
- 积食|多吃苹果能帮孩子消积食?医生提醒:若想脾胃健康,3物建议少碰
- 苹果密码栏变方框(电脑出现黑框怎么办)
- 苹果|有孕期间,有些水果孕妈要舍得吃,能改善贫血,对胎儿皮肤也有益
- 苹果|要想宝宝脾胃强健吃饭香,两种水果煮水喝,个头蹿得也快
- 水果|孕妇吃苹果孩子皮肤白,吃葡萄眼睛大?错!医生:两类孕妈别吃