{"id":1049,"date":"2024-08-27T15:48:46","date_gmt":"2024-08-27T15:48:46","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1049"},"modified":"2025-07-28T09:30:56","modified_gmt":"2025-07-28T09:30:56","slug":"crib-notes-crysis-ransomware-with-a-dash-of-political-mockery","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/crib-notes-crysis-ransomware-with-a-dash-of-political-mockery\/","title":{"rendered":"Crib Notes: Crysis \u2013 Ransomware with a dash of political mockery"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"528\" height=\"350\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/crib_notes_crysis-rsware-featimg-image.jpg\" alt=\"\" class=\"wp-image-1054\"\/><\/figure>\n<\/div>\n\n\n<p>Crysis is a type of ransomware that has been around since early 2016. Essentially, once the payload has been opened, Crysis encrypts all your files and data and directs you to make a payment with bitcoin in order to recover your files.<br><br><strong>Recently: <\/strong>Earlier this year,in the wake of numerous sanctions placed upon Russia placed by Western governments in response to the annexation of Crimea, Crysis was used in attacks with a political flavour \u2013 attacks which included a satirical political cartoon on the \u2018ransom letter\u2019 page.<br><br>An image of this ransom letter page is below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/crysis_rsware_image1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Victims are forced to pay a six bitcoin ($6,500 USD) ransom in order to have their files decrypted. The ransom note gives those infected five days to purchase the decryption tool and warns that files will be permanently deleted if third party tools are used to try and recover data.<br><br><strong>Technically: <\/strong>Now, let\u2019s take a look at some of the coding under Crysis\u2019 hood.<br><br>One of the ransomware\u2019s particularly interesting features is the encryption technique it uses. A combination of RSA and AES algorithms encrypt the files and the network share drive of the infected machine. &nbsp;Also, it is able to infect both the Windows and MAC platforms as well as virtual platforms connected to the victim machine. &nbsp;&nbsp;<br><br>Keeping with the encryption theme, another distinct characteristic is the encrypted file type extensions. Once on the victim\u2019s machine, file type extensions are changed to unique names in order to help mark the ransomware. Some of the file type extensions Crysis uses are below:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/crysis_rsware_image2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>We found a number of ransomware samples this year, so let\u2019s look at the code from one such sample below:<br><br><strong>MD5: 5a8f288a70d4f3eef99af34bb3d10217fc7fd6d6bb6a13c1c8db5aee7bef40b4<\/strong><\/p>\n\n\n\n<p><strong>Filename: Dakini.exe<\/strong><br><br>The file at the time of installation copies itself to locations like:-<br><br>%localappdata%\\%dakini%.exe<br><br>%windir%\\system32\\%dakini.exe<br><br>The following Registry value changes were also observed by the Malicious executable to run on system startup:-<br><br>HKEY_LOCAL_MACHINE\\\u00adSoftware\\\u00adMicrosoft\\\u00adWindows\\\u00adCurrentVersion\\\u00adRun<br><br>Once the file is encrypted it drops a \u2018How-To-Decrypt\u2019 \u201c<strong>readme.txt<\/strong>\u201d\/ \u201c<strong>how_to _decrypt.htm<\/strong>l\u201d on the \/User\/Desktop. In some cases, the Desktop Background is also changed to show ransom demands.<br><br>The variants identified in February 2017 were seen to exploit the Remote Desktop Protocol connections through brute-force attacks.<br><br>This variant \u2013 dubbed \u2018Sanctions 2017\u2019 \u2013 is a variant of the Crysis\/Dharma family and uses the \u201c.wallet\u201d file extension on encrypted files. The malware falls under the category of \u201cAdvanced Malware\u201d for the capabilities it shows such as information stealing and the ability to control voice recording features on infected machines.<\/p>\n\n\n\n<p>The exploitation phase of the threat cycle shows a few additional features like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using Malicious Scripts to spread the infection<\/li>\n\n\n\n<li>Deploying Exploit Tool kit to connect to the Command and Control server<\/li>\n\n\n\n<li>High degree of obfuscation on the malicious code to hide the attack platforms<\/li>\n<\/ul>\n\n\n\n<p><strong>Prevalence:<\/strong> According to New Jersey Cybersecurity (ROIC),variants of the Crysis ransomware made up about 64 per cent of all ransomware attacks last year<strong>.<br><br>Mitigation: <\/strong>During the first few months of 2017, a number of companies released free decryption tools designed to help Crysis victims recover their files and data. However, as with all pieces of malware, the development cycle means that each new variant nullifies the old decryption tool, meaning that keeping pace with attackers is a difficult task. With the latest \u201cSanctions 2017\u201d variant, some steps on how to remove the ransomware are <a href=\"http:\/\/sensorstechforum.com\/sanctions-2017-ransomware-remove-restore-wallet-files\/\" target=\"_blank\" rel=\"noopener\">available here<\/a>. &nbsp;<br><br><strong>Targets:<\/strong> Crysis was used to target large health sector organizations, financial institutions and smaller scale business \u2013 particularly those in North America and Europe.<br><br><strong>Attribution: <\/strong>We don\u2019t know a lot about the attackers behind the latest Crysis campaign. While the political cartoon leads us to believe the attackers are either Russian or sympathetic to Russian interests, we do know that the actor behind this campaign uses an @india.com email domain address as the primary contact to demand ransom. &nbsp;Additionally, we have seen reports on security forums stating that victims have not received the decryption tool despite paying the ransom demands.<br><br>It further proves that warning from the security researchers to not pay those criminals are true and waiting patiently for the decryption tool is the best approach.&nbsp;&nbsp; Also this shows the impact of ransomware on the business operations and organizations are finding hard to run without requisite data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crysis is a type of ransomware that has been around since early 2016. Essentially, once the payload has been opened, Crysis encrypts all your files and data and directs you to make a payment with bitcoin in order to recover your files. Recently: Earlier this year,in the wake of numerous sanctions placed upon Russia placed by Western governments in response to the annexation of Crimea, Crysis was used in attacks with a political flavour \u2013 attacks which included a satirical political cartoon on the \u2018ransom letter\u2019 page.<\/p>\n","protected":false},"author":1,"featured_media":1054,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1049"}],"version-history":[{"count":5,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1049\/revisions"}],"predecessor-version":[{"id":4080,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1049\/revisions\/4080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1054"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}