chg: [ransomware] Babuk Ransomware added

This commit is contained in:
Alexandre Dulaunoy 2021-01-05 19:11:28 +01:00
parent 4454b58743
commit 184d57f0a2
Signed by: adulau
GPG key ID: 09E2CD4944E6CBCD

View file

@ -13964,6 +13964,16 @@
"uuid": "6955c28e-e698-4bb2-8c70-ccc6d11ba1ee",
"value": "WastedLocker"
},
{
"description": "Since this is the first detection of this malware in the wild, its not surprising that Babuk is not obsfuscated at all. Overall, its a pretty standard ransomware that utilizes some of the new techniques we see such as multi-threading encryption as well as abusing the Windows Restart Manager similar to Conti and REvil. For encrypting scheme, Babuk uses its own implementation of SHA256 hashing, ChaCha8 encryption, and Elliptic-curve DiffieHellman (ECDH) key generation and exchange algorithm to protect its keys and encrypt files. Like many ransomware that came before, it also has the ability to spread its encryption through enumerating the available network resources.",
"meta": {
"refs": [
"http://chuongdong.com//reverse%20engineering/2021/01/03/BabukRansomware/"
]
},
"uuid": "c52a65d5-9bea-4a09-a81b-7f789ab48ce0",
"value": "Babuk Ranomsware"
},
{
"description": "Darkside, the latest ransomware operation to emerge has been attacking organizations beginning earlier this month. Darksides customized attacks on companies have already garnered them million-dollar payouts.\nThrough their “press release”, these threat actors have claimed to be affiliated with prior ransomware operations making millions of dollars. They stated that they created this new product to match their needs, as prior products didnt.\n Darkside explains that they only target companies they know that can pay the specified ransom. They have allegedly promised that they will not attack the following sectors. They include medicine, education, non-profit organizations, and the government sector.",
"meta": {
@ -14017,5 +14027,5 @@
"value": "RansomEXX"
}
],
"version": 90
"version": 91
}