ARCrypter ransomware strain detailed by BlackBerry

Share post:

A new ransomware strain has been detected by researchers at BlackBerry, who say it has been seen hitting organizations in Canada, China, Chile, and Columbia.

Dubbed ARCrypter, because the unique strings “ARC” were found in all the samples the researchers analyzed, it first appeared in August.

Unlike other ransomware variants, BlackBerry said, where a ransom note is dropped after the file encryption stage, ARCrypter drops the ransom note before the files are encrypted. Upon ransom note delivery, the dropper then proceeds to drop two batch scripts and the main payload encrypter.

The attack vector — phishing, brute force attacks or vulnerability exploits — isn’t known.

Through hunting efforts, BlackBerry has found samples associated with the first ARCrypter campaign from early August 2022. But the first public indication of a new ransomware strain came on August 25th, when Chile’s government IT systems were attacked and its computer incident response team published a report which contained some indicators of compromise. Then on October 3rd, Invima, the Colombia National Food and Drug Surveillance Institute, reported a cyber attack that BlackBerry believes was the same strain.

Following these incidents, the researchers found submissions on the VirusTotal scanner by apparently real victims from China and Canada.

In their investigation of how the ransomware is installed, the researchers found the use of AnonFiles, an anonymous download service. It deposits two files: The “win.zip” file is a password-protected archive containing the “win.exe” file. The “win.exe” file is a dropper file, which has two resources – BIN and HTML. The HTML resource stores ransom note contents, and the BIN resource contains encrypted data, probably the ARCrypter ransomware.

To decrypt the BIN resource, the dropper expects an argument “-p” followed by a password. Once the password is entered by the threat actor the dropper creates a random directory under one of the following environment variables:

  • %TMP%
  • %APPDATA%
  • %ALLUSERSPROFILE%
  • %HOMEPATH%

The purpose of this newly created directory is to store the second stage payload, the ransomware.

The ransom note contains the username and password required for the victim to log into the communication panel with the threat actors, which is hosted on the .onion site.

The report includes indicators of compromise that IT security teams will find useful.

The post ARCrypter ransomware strain detailed by BlackBerry first appeared on IT World Canada.

Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways