Close Menu
The Elite TimesThe Elite Times
  • Home
  • Entrepreneur
  • Finance
  • Fund
  • Investment
  • Marketing
  • Stock
  • World
  • Business

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Visionary Entrepreneur Manuel Manzoni and International Taxation Expert Marco Scardeoni Partner to Drive Global Expansion through GCC Advisors

April 16, 2024

Help comes to Fort Worth businesses affected by explosion – NBC 5 Dallas-Fort Worth

March 29, 2024

Lawmakers claim ‘irresponsible’ withdrawal from Endowment Fund proceeds to pay full dividends

March 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
The Elite TimesThe Elite Times
  • Home
  • Entrepreneur

    21 Great Business Ideas for Nurse Entrepreneurs

    March 27, 2024

    EY announces 18 female entrepreneurs selected for EY Entrepreneurial Winning Women™ Asia-Pacific class of 2024 | EY

    March 27, 2024

    Victims of Baltimore bridge collapse include father of three and budding entrepreneur

    March 27, 2024

    Until April 2nd, get great discounts with lifetime access to this stock market app

    March 27, 2024

    Secure and reliable project management support for $25

    March 27, 2024
  • Finance

    Rocket Pharmaceuticals Announces Appointment of Aaron Ondrey as Chief Financial Officer and Additional Updates to Corporate Leadership Team

    March 26, 2024

    Reddit ignites resurgence in meme stocks, further sign of ‘bull market on all fronts’

    March 26, 2024

    Walmart stock plummets, retail giant expected to see further growth

    March 26, 2024

    Stocks soar as Wall Street looks to continue breaking records

    March 26, 2024

    Stocks soar as Wall Street looks to continue breaking records

    March 26, 2024
  • Fund

    Help comes to Fort Worth businesses affected by explosion – NBC 5 Dallas-Fort Worth

    March 29, 2024

    Lawmakers claim ‘irresponsible’ withdrawal from Endowment Fund proceeds to pay full dividends

    March 29, 2024

    The LDP slush fund scandal: What will make po

    March 29, 2024

    City of San Antonio seeks dismissal of Reproductive Justice Fund lawsuit

    March 29, 2024

    Clashes expected between Biden fundraisers and President Trump during preview visit to New York

    March 29, 2024
  • Investment

    Amazon (NASDAQ:AMZN) accelerates investment in humanity and accelerates AI drive

    March 28, 2024

    Recent trends in Kazakhstan’s investment situation

    March 28, 2024

    City of South Bend shares plans for Madison Lifestyle District with more than $330 million in private investment

    March 28, 2024

    OKX Ventures announces strategic investment in MyShell, a pioneer in AI-integrated Web3 technology

    March 28, 2024

    Reform of the EU Foreign Direct Investment Screening Regulation – How might M&A Transactions be impacted? | Mayer Brown

    March 28, 2024
  • Marketing

    Premium hospitality is on fire

    March 27, 2024

    S&P 500 sets record as Wall Street emerges from lull

    March 27, 2024

    DevvStream Announces Multi-Year Agreement to Sell CFR Credits with Major Logistics and Marketing Company

    March 27, 2024

    Global online dating services market by service (casual dating, matchmaking, niche dating), subscription (annual, monthly, quarterly), age group, and gender

    March 27, 2024

    Tower Federal Credit Union Receives Two CUNA Diamond Awards for Creative Excellence in Marketing

    March 27, 2024
  • Stock

    Forget Tesla: We think the ‘Magnificent Seven’ should replace this stock

    March 27, 2024

    Forget about Tesla: One of the unstoppable artificial intelligence (AI) stocks belongs to the ‘Magnificent Seven’ instead

    March 27, 2024

    2 Artificial Intelligence (AI) Stocks with Potential for Parabolic Growth

    March 27, 2024

    Mr. Powell’s comment

    March 27, 2024

    What you need to know about Trump Media’s stock debut

    March 27, 2024
  • World

    Take a look inside the New York Stock Exchange, the world’s largest stock market

    March 26, 2024

    China challenges Biden’s electric vehicle plan at World Trade Organization

    March 26, 2024

    Wolfspeed joins Senator Thom Tillis and key officials to conquer world’s largest and most advanced silicon carbide facility

    March 26, 2024

    Amy Brenneman, Raviv Ullman, Jeremy Love, cast and others in ‘Galilee’ world premiere, 34 years old

    March 26, 2024

    These beauty brands are among the most innovative companies in the world

    March 26, 2024
  • Business

    Canadian business leaders say housing should be a top federal budget priority

    March 27, 2024

    The power of mentorship in business

    March 27, 2024

    Los Angeles County business owner forced to pay damages after SWAT raid

    March 27, 2024

    Chinese President Xi meets with foreign business leaders amid economic uncertainty | Business and Economic News

    March 27, 2024

    China’s Xi Jinping meets with US business leaders in Beijing

    March 27, 2024
The Elite TimesThe Elite Times
Home»World»Multi-stage RA World ransomware uses anti-AV tactics and exploits GPOs
World

Multi-stage RA World ransomware uses anti-AV tactics and exploits GPOs

The Elite Times TeamBy The Elite Times TeamMarch 5, 2024No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

[ad_1]










Multi-stage RA World ransomware uses anti-AV tactics and exploits GPOs











ransomware

Trend Micro’s threat hunting team discovered the RA World attack, which involved multi-stage components designed to ensure maximum impact.

Authors: Nathaniel Morales, Catherine Casona, Yeliz Nicole Gonzalez, Ivan Nicole Chavez, Maristel Policarpio, Jacob Santos

March 4, 2024

Reading time: ( words)


RA World (formerly RA Group) ransomware first emerged in April 2023 and has since successfully infiltrated organizations around the world. Although this threat actor has a widespread attack network, many of its targets are within the United States, with fewer attacks occurring in countries such as Germany, India, and Taiwan. Regarding industry, the Group focuses on businesses in the healthcare and financial sectors.

Figure 1. Industries affected by RA World ransomware based on the group's leaked sites

Figure 1. Industries affected by RA World ransomware based on the group’s leaked sites

Figure 2. Countries affected by RA World ransomware based on group leaked sites

Figure 2. Countries affected by RA World ransomware based on group leaked sites

Trend Micro’s threat hunting team discovered the RA World attack targeting several healthcare organizations in the Latin American region. This attack includes multi-stage components designed to ensure maximum effectiveness and success for the group’s operations.

RA world multi-stage attack

Figure 3. RA World attack chain

Figure 3. RA World attack chain

initial access

The RA World operator first infiltrates via a compromised domain controller and delivers its components to the SYSVOL share path of the machine’s Group Policy Object (GPO).

Privilege escalation

Our internal telemetry shows: Stage1.exe is being run using PowerShell within the network, suggesting that Group Policy settings may have been changed to allow PowerShell scripts to run.

$systemdir$\WindowsPowerShell\v1.0\powershell.exe → \\ <サーバー名>\SYSVOL\<ドメイン>\Policies\\MACHINE\Microsoft\Stage1.exe

Assuming the malware is located within the Group Policy infrastructure, an attacker may have modified Group Policy settings or scripts to include a malicious payload. This could result in malware being executed on the targeted machine as part of the Group Policy process, potentially impacting multiple machines within the domain.

lateral movement

at first, Stage1.exe List all domain controllers associated with the current domain. It then validates the current domain name, iterates through each domain controller, and exits if certain conditions are met.

These conditions include checking the first part of the domain controller name to see if it matches the local machine’s hostname. moreover, Stage1.exe It also checks for the existence of exit.exe and Exclude.exe inside %WINDIR%\Help directory.The presence of exit.exe Although it suggests the possibility of an advance compromise, Exclude.exe Indicates that the machine may be excluded.

    Figure 4. Stage1.exe checks if conditions are met before continuing

Figure 4. Stage1.exe checks if conditions are met before continuing

After the first check, the ransomware checks the following: Stage2.exe already exists on local machine %WINDIR%\Help directory.otherwise it will be copied payment.txt and Stage2.exe Move from the hardcoded SYSVOL path to your local machine and continue execution. Stage2.exe.

Figure 5. Stage1.exe copying payload to local machine

Figure 5. Stage1.exe copying payload to local machine

This analysis indicates a targeted attack, as the binary contains a hardcoded corporate domain name and SYSVOL path. Additionally, we propose a strategy where the payload is initially located within the compromised machine and then executed against other local machines using Group Policy, with the goal of compromising systems within the target network. It shows a multi-stage attack approach.

Stage2.exe Responsible for delivering ransomware payloads.like stage1.exeit also contains an embedded string featuring the targeted company’s domain name.

Figure 6. Stage2.exe with the target company name in the “args” string

Figure 6. Stage2.exe with the target company name in the “args” string

Persistence

The program begins by evaluating whether your machine is running in safe mode. If not, similar validation is performed. Exclude.exe and exit.exe. Next, proceed to create a new service named. MSOfficeRunOncelslswhich includes: Stage2.exe as a service configured to run with safe mode and networking.

Defense avoidance

Figure 7. Creating a service and adding registry keys for safe mode

Figure 7. Creating a service and adding registry keys for safe mode

Figure 7. Creating a service and adding registry keys for safe mode

Additionally, configure boot configuration data (BCD) to safe mode and networkingproceed to boot the machine and start mode.

Figure 8. Enabling safe mode

Figure 8. Enabling safe mode

If your machine is already in safe mode, Stage2.exe Similarly, Exclude.exe and exit.exe on the system.Then decrypt payment.txt its content using Base64 and AES encryption. Stage3.exewhich acts as the ransomware payload.

Figure 9. Ransomware payload decryption

Figure 9. Ransomware payload decryption

After the ransomware payload is executed, cleanup activities are performed to remove malware remnants and create registry keys.

Figure 10. Cleanup code

Figure 10. Cleanup code

impact

Finally, the RA World ransomware payload (Stage3.exe) is expanded. The ransomware, which uses the leaked Babuk source code, drops a text file. exit.exe This only contains the string “”Hello World”. Also, a mutex is created.For whom the bell tolls, it tolls for you” Previous versions used the same mutex names as Babak ransomware.

The ransom note also included a list of recent victims who were unable to pay the ransom as part of the blackmailer’s extortion tactics, pressuring other victims to comply with the group’s demands.

        Figure 11. RA World ransom note

Figure 11. RA World ransom note

AV measures

RA World operators are also expanding SD.Bat, is a script that attempts to erase the Trend Micro folder. Additionally, it uses the WMI Command Line (WMIC) utility to gather information about the disk and leave login information. C:\DISKLOG.TXT.

After deleting the Trend Micro folder, the ransomware safe mode and networking Options created from the Windows default boot configuration.

Finally, force restart your computer immediately.

Figure 12. SD.bat script

Figure 12. SD.bat script

Despite Babuk’s “retirement” in 2021, the leak of the gang’s source code has made it easier for a number of new threat groups to enter the ransomware landscape, including the operators of RA World ransomware. Ta. With the advent of Ransomware-as-a-Service (RaaS), this type of source code leakage lowers the barrier to entry for ransomware operators, allowing cybercriminals without the necessary technical skills and knowledge to create their own ransomware. Enables users to create ransomware families and participate in ransomware. malicious operation.

Our analysis shows that incidents involving RA World ransomware and healthcare organizations are targeted, as evidenced by component files containing strings associated with victim companies.

Organizations can consider adopting the following best practices to minimize their chances of falling victim to a ransomware attack.

  • Assign administrative privileges and access to employees only when necessary.
  • Update your security products regularly and conduct regular scans.
  • Protect your important data through regular backups and prevent possible loss.
  • Be careful when interacting with emails and websites, downloading attachments, clicking URLs, and running programs.
  • Encourage users to report potentially suspicious emails and files to your security team.
  • Regularly educate your users about social engineering risks and indicators.

Using a layered security approach, organizations can harden potential access points to their systems, such as endpoints, email, web interfaces, and networks. The following security solutions can help improve your company’s security by identifying malicious components and anomalous behavior.

  • Trend Vision One™ provides multi-layered protection and behavior detection to block suspicious behavior and tools before ransomware can do any damage.
  • Trend Micro Apex One™ provides next-level automated threat detection and response to advanced concerns such as fileless threats and ransomware to ensure endpoint protection.

Indications of infringement for this entry can be found here.

MITER ATT&CK TACTICS AND TECHNIQUES

tactics technology ID
privilege elevation Group policy changes T1484.001
lateral movement Lateral tool movement T1570
Defense avoidance Compromise Defenses – Safe Mode Boot T1562.009
Delete indicator T1070
Delete indicator – Delete file T1070.004
Registry changes T1112
Persistence Creating or modifying system processes – Windows services T1543.003
impact Encrypt data for impact T1486
System shutdown/reboot T1529
data destruction T1485

tag

sXpiBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk

[ad_2]

Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe biometric authentication market utilizing AI is expected to grow at a CAGR of 13.2% until 2033.The need for secure authentication increases to drive growth
Next Article Philip Morris supports female entrepreneurs with $5 million investment
The Elite Times Team
  • Website

Related Posts

Take a look inside the New York Stock Exchange, the world’s largest stock market

March 26, 2024

China challenges Biden’s electric vehicle plan at World Trade Organization

March 26, 2024

Wolfspeed joins Senator Thom Tillis and key officials to conquer world’s largest and most advanced silicon carbide facility

March 26, 2024
Leave A Reply Cancel Reply

Demo
Latest Posts

21 Great Business Ideas for Nurse Entrepreneurs

March 27, 2024

EY announces 18 female entrepreneurs selected for EY Entrepreneurial Winning Women™ Asia-Pacific class of 2024 | EY

March 27, 2024

Victims of Baltimore bridge collapse include father of three and budding entrepreneur

March 27, 2024

Until April 2nd, get great discounts with lifetime access to this stock market app

March 27, 2024
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss

Compare Air India’s new A350 business class to the clunky 777 cabin

By The Elite Times TeamFebruary 13, 2024

[ad_1] downward angle icon An icon in the shape of a downward facing corner. The…

Local restaurants increase business hours for Valentine’s Day

February 15, 2024

Comprehensive guide to small business insurance

February 16, 2024

Subscribe to Updates

Get the latest creative news from SmartMag about art & design.

Demo
About Us
About Us

Welcome to [Your Website Name], your go-to source for comprehensive information on funds, investments, and the latest in stock news. We are dedicated to providing you with accurate, insightful, and up-to-date content to empower your financial decisions.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Visionary Entrepreneur Manuel Manzoni and International Taxation Expert Marco Scardeoni Partner to Drive Global Expansion through GCC Advisors

April 16, 2024

Help comes to Fort Worth businesses affected by explosion – NBC 5 Dallas-Fort Worth

March 29, 2024

Lawmakers claim ‘irresponsible’ withdrawal from Endowment Fund proceeds to pay full dividends

March 29, 2024
Most Popular

Visionary Entrepreneur Manuel Manzoni and International Taxation Expert Marco Scardeoni Partner to Drive Global Expansion through GCC Advisors

April 16, 2024

Teenage Girl Finds Mom’s Debit Card, Spends $64,000 on Mobile Games

January 9, 2020

Apple’s Beats Studio Pro Headphones Listed in FCC Database Ahead of Launch

January 10, 2020
© 2025 theelitetimes. Designed by theelitetimes.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.