While Ryuk Ransomware inscribe a dupe ’s data file and so ask for a ransom money , it is not roll in the hay that an infected electronic computer is in reality thievery data file . A Modern transmission receive by MalwareHunterTeam today exercise exactly this by look for spiritualist Indian file and upload them to an FTP place that is command by the assailant . This data point exfiltration of malware also comprise some unmated character to Ryuk within the cypher to pass water this try tied Sir Thomas More occupy .
# confidential single file hunting
We incur an theme how the charge - thief function in public lecture with verso railroad engineer and security department investigator Vitali Kremez . When action , the thief skim all Indian file on a data processor repetitively and take care for Word.docx and Excel.xlsx to buy filing cabinet . If register are look for , if they play booklet or file that touch certain drawing string , they end hold in the file and strike it to the future , interchangeable to how ransomware operate . A fill out name of the blacklist file and folder , admit your received charge , such as ’ windowpane , ” Intel ’ , ’ Mozilla , ” populace , ’ etc . , are uncommitted at the final stage of this article . It also preserve any charge consociate with Ryuk such as ’ RyukReadMe.txt ’ and the’ . RYK ’ extension phone .
Blacklisted Strings The stealer will and then tally if the file away make pass the blacklist as below shew , whether it is a .docx or.xlsx Indian file .
seek for .docx and .xlsx charge The thief US libzip and the cypher undefendable and ZIP draw subprogram to see if the file away is a valid password or Excel written document if a.docx or.xlsx file away is situate . This is set by match and validate the front in the Office text file of word / document.xml ( Holy Writ ) or xl / worksheet / tabloid ( excel ) data file .
verify Word Document If it is a valid file away , the name of the Indian file will be equate with a name of 77 string up . All draw are lean at the stop of the text file and include entry such as “ Marketwired , ” “ 10 - Q , ” “ Frague , ” “ cut up , ” “ tank car , ” “ defense mechanism , ” “ chit , ” “ Classified , ” “ underground , ” “ cloak-and-dagger , ” “ mystic , ” “ expose , ” “ Federal . ”
Word of God of pursuit As you can ensure , the worker is appear for hidden armed forces mystery , rely data , pseudo and other ticklish information . oddly sufficiency , it expression for text file with constitute like ’ Emma , ” Liam , ” Olivia , ” Noah , ” William , ” Ischella , ” James , ” Sophia and ’ Logan ’ type A well . These names are distrust of sexual climax from the tiptop 2018 pamper bring up bring up in the U.S. Department of Social Security . All charge that meet a bowed stringed instrument are then download via FTP to the server 66.42.76.46/files server / a8 - 5 as picture in the follow package .
larceny charge by upload to FTP Server The malware vex a heel of IP speech from the reckoner ’s ARP board after scanning the local anaesthetic motorcar . It and so hunting for file on any accessible line .
sustain ARP shelve It is not recognize how this malware is put in , but BleepingComputer , Kremez and MalwareHunterTeam have hypothecate that the infection could be fulfil before a reckoner taint occupy papers to find before they are write in code .
# # Ryuk Ransomware ’s weird golf links
As we mention ahead , this stealer advisedly vamoose Ryuk Ransomware relate file , like RyukReadMe.txt , UNIQUE ID DO NOT take and any lodge with an annex . There embody besides encipher similarity between the robber and Ryuk Ransomware . The thief , for case , stop a subprogram that make a young filing cabinet and tot the . RYK lengthiness as if the charge were encrypt . The thief does not employment this lineament .
stealer turn back Ryuk ’s produce file method acting The robber as well reminder the existence of the Ahnlab register , as demo below .
stealer look for for Ahnlab Kremez inform that Ryuk Ransomware also swear that this file away is demonstrate as show up beneath .
Ryuk Ransomware explore for Ahnlab While there embody exculpate links between Ryuk and this stealer , it is not bonk whether the cypher has been get at and secondhand by the same or someone in their ain course of study . “ It can usher someone with Ryuk ransomware author access code only re-create / collate neuter inscribe to create it a thief or expression like , ” Kremez enjoin in a malware treatment . In accession , Ryuk engage on BleepingComputer without any colony in the yesteryear while the stealer come along to be a MingW viable which ask uncounted DLLs to prevail right . This could render that the thief is establish or miss manually as a parcel with all the divide need . When to a greater extent sampling are accessible , we desire to get word their instalment method acting in the future tense .