CL0P Ransomware Gang Leaks NSW Transport Data On The Dark Web

CL0P Ransomware Gang Leaks NSW Transport data on the Deep and Dark Web
CL0P Ransomware Gang Leaks NSW Transport data on the Deep and Dark Web

In this article, LMNTRIX Labs will focus on the ransomware group “Cl0p” – an extortionist Ransomware group who were operating and targeting companies from 2019. The Cl0p ransomware group techniques and tactics resemblance with TA505 a financially motivated threat group active since 2014.

In recent days, LMNTRIX Labs have observed an increased activity of the Cl0p ransomware gangs targeting multiple enterprises, companies across the globe. Following is their activity timeline from the last two years.  This particular group has been visibly active throughout COVID-19 spike phases and targeted pharmaceutical companies extensively. Interestingly, the Accellion breach which was reported due to a FTA vulnerability exploitation was also linked to the Cl0p ransomware group.

Activity Timeline

Sample Analysis

Following sample was recently used by the Clop Ransomware group in their latest campaign

SHA256: 15f9ed36d9efc6e570b4f506791ce2c6a849853e2f6d587f30fb12d39dba2649

Sample Name: Ul7Koup6DD.bin

Process path: C:\Users\Xmp\Desktop\hfq3LofMt4.exe

Analysing the sample, we have seen the malicious binary is sharing the code among all the samples seen for the Cl0p ransomware sample. Around 480+ strings reuse by the sample has also been observed.

Related Sample

Sample TimelineSHA256
Feb 202109ab880f3021ac2d05e09bebd567ddf5f6f7cfb396573efd819a056931f3b391
Dec 2019cff60c9c30bf71112c79f788c4ccbd7151285d52be31c8e891b365d93a7e241d
Nov/Dec 20207c19c49836ed7dccd0ebcd5a5a56f6b6411ecc59fdc7fa31f0ee0f64eee7aa89
Dec 20207c6e5cd61fafd38e420c2bd9e12ed1ec06e31dd5d20c081d214a96c16b1492c8
Jan 2021968307a367471e25bef58b0d4687ab4fdf34539bbfb603b5b19ae99d4d0c0340

The ransomware program is written in C ++ and developed in Visual Studio. So far observed Cl0p samples are for the x86 architecture. The size of the unpacked sample is between 100 and 200 KB. Cl0p renames the encrypted files and appends the file ending with (“. Cllp ” OR “. CI0p”.)

MITRE MATRIX

Attribution

The modus operandi of the gang has been to use the double extortion technique. They use lateral movement technique to exfiltrate large amount of victim’s data from their network and then finally launches the Ransomware. This is a full proof method, that even though the victims have a backup of their data, and refuse to pay the ransom, the Gang still threatens to leak the data stolen onto their dark Web leak site as shown below. The gang also uses a chat site to chat with their victims to fix the extortion amount.

NSW Transport’s terabytes of data was leaked onto the Dark Web in a similar fashion, when it was dumped in 9 different parts. These include contract details, email communications, and much more. Here is the snapshot from the NSW Transport leak:

Mitigation

*****YARA RULE FOR CLOP RANSOMWARE************************

rule win_clop_auto {

    meta:

        date = “2021-2-21”

        version = “1”

/* DISCLAIMER

     * The strings used in this rule have been automatically selected from the

     * disassembly of memory dumps and unpacked files, using .

strings:

        $sequence_0 = { 68???????? 68???????? e8???????? 83c424 6aff }

            // n = 5, score = 300

            //   68????????           |                    

            //   68????????           |                    

            //   e8????????           |                    

            //   83c424               | add                 esp, 0x24

            //   6aff                 | push                -1

        $sequence_1 = { ffd0 c3 8bff 55 8bec 83ec1c 8d4de4 }

            // n = 7, score = 300

            //   ffd0                 | call                eax

            //   c3                   | ret                

            //   8bff                 | mov                 edi, edi

            //   55                   | push                ebp

            //   8bec                 | mov                 ebp, esp

            //   83ec1c               | sub                 esp, 0x1c

            //   8d4de4               | lea                 ecx, [ebp – 0x1c]

        $sequence_2 = { 6a04 6800300000 6887000000 6a00 }

            // n = 4, score = 300

            //   6a04                 | push                4

            //   6800300000           | push                0x3000

            //   6887000000           | push                0x87

            //   6a00                 | push                0

        $sequence_3 = { 8d85bcefffff 50 ff15???????? 68???????? }

            // n = 4, score = 300

            //   8d85bcefffff         | lea                 eax, [ebp – 0x1044]

            //   50                   | push                eax

            //   ff15????????         |                    

            //   68????????           |                    

        $sequence_4 = { ff15???????? 68???????? 8d85dcf7ffff 50 }

            // n = 4, score = 300

            //   ff15????????         |                    

            //   68????????           |                    

            //   8d85dcf7ffff         | lea                 eax, [ebp – 0x824]

            //   50                   | push                eax

        $sequence_5 = { 6a00 ff15???????? 68???????? 8bd8 }

            // n = 4, score = 300

            //   6a00                 | push                0

            //   ff15????????         |                    

            //   68????????           |                    

            //   8bd8                 | mov                 ebx, eax

        $sequence_6 = { e8???????? 83c408 6aff ff15???????? 33c0 }

            // n = 5, score = 300

            //   e8????????           |                    

            //   83c408               | add                 esp, 8

            //   6aff                 | push                -1

            //   ff15????????         |                    

            //   33c0                 | xor                 eax, eax

        $sequence_7 = { 8d85c8efffff 50 6a08 6a01 ff15???????? 85c0 }

            // n = 6, score = 300

            //   8d85c8efffff         | lea                 eax, [ebp – 0x1038]

            //   50                   | push                eax

            //   6a08                 | push                8

            //   6a01                 | push                1

            //   ff15????????         |                    

            //   85c0                 | test                eax, eax

        $sequence_8 = { 83c40c 33f6 85ff 7428 }

            // n = 4, score = 300

            //   83c40c               | add                 esp, 0xc

            //   33f6                 | xor                 esi, esi

            //   85ff                 | test                edi, edi

            //   7428                 | je                  0x2a

        $sequence_9 = { 53 8bf8 ff15???????? 8bf0 56 6a40 }

            // n = 6, score = 300

            //   53                   | push                ebx

            //   8bf8                 | mov                 edi, eax

            //   ff15????????         |                    

            //   8bf0                 | mov                 esi, eax

            //   56                   | push                esi

            //   6a40                 | push                0x40

        $sequence_10 = { 83c40c 6860070000 6a40 ff15???????? }

            // n = 4, score = 300

            //   83c40c               | add                 esp, 0xc

            //   6860070000           | push                0x760

            //   6a40                 | push                0x40

            //   ff15????????         |                    

        $sequence_11 = { 8bf0 56 53 ff15???????? 50 ff15???????? 56 }

            // n = 7, score = 300

            //   8bf0                 | mov                 esi, eax

            //   56                   | push                esi

            //   53                   | push                ebx

            //   ff15????????         |                    

            //   50                   | push                eax

            //   ff15????????         |                    

            //   56                   | push                esi

        $sequence_12 = { 53 56 ff15???????? 56 ff15???????? 53 ff15???????? }

            // n = 7, score = 300

            //   53                   | push                ebx

            //   56                   | push                esi

            //   ff15????????         |                    

            //   56                   | push                esi

            //   ff15????????         |                    

            //   53                   | push                ebx

            //   ff15????????         |                    

        $sequence_13 = { 50 ff15???????? 56 53 8bf8 ff15???????? }

            // n = 6, score = 300

            //   50                   | push                eax

            //   ff15????????         |                    

            //   56                   | push                esi

            //   53                   | push                ebx

            //   8bf8                 | mov                 edi, eax

            //   ff15????????         |                    

        $sequence_14 = { 83c424 53 50 ffd6 }

            // n = 4, score = 300

            //   83c424               | add                 esp, 0x24

            //   53                   | push                ebx

            //   50                   | push                eax

            //   ffd6                 | call                esi

        $sequence_15 = { 50 e8???????? 83c40c c785f0efffff00080000 8d85f0efffff c785ecefffff00000000 c785f4efffff00000000 }

            // n = 7, score = 200

            //   50                   | push                eax

            //   e8????????           |                    

            //   83c40c               | add                 esp, 0xc

            //   c785f0efffff00080000     | mov    dword ptr [ebp – 0x1010], 0x800

            //   8d85f0efffff         | lea                 eax, [ebp – 0x1010]

            //   c785ecefffff00000000     | mov    dword ptr [ebp – 0x1014], 0

            //   c785f4efffff00000000     | mov    dword ptr [ebp – 0x100c], 0

    condition:

        7 of them and filesize < 630784

}

____________________________XXXXXXXXXXXXXXXXX_______________________________________

Tags: No tags

Comments are closed.