{"id":2340,"date":"2024-09-25T17:42:08","date_gmt":"2024-09-25T17:42:08","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2340"},"modified":"2025-07-29T03:36:48","modified_gmt":"2025-07-29T03:36:48","slug":"lmntrx-vs-egregor-ransomware","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/lmntrx-vs-egregor-ransomware\/","title":{"rendered":"LMNTRX vs Egregor Ransomware"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/lmntrix-vs-Egregor-Ransomware.webp\" alt=\"\" class=\"wp-image-2369\"\/><\/figure>\n<\/div>\n\n\n<p>Egregor ransomware is a new strain of ransomware found in the wide range of attacks seen in many global organizations in the last couple of weeks. They found to be using similar code obfuscation and packed payloads to escape security detection as Sekhmet. It is a clear indication that Egregor ransomware is a variant of Sekhmet malware, many threat researchers acknowledged that Egregor seems to be derived from the Sekhmet malware family. The threat group brags about their attacks on the dark web by leaking stolen data and other activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>INFECTION<\/strong><\/h2>\n\n\n\n<p>In this article, our researchers collected the samples prevented by the LMNTRIX Active Defense solution from production client networks and conducted their analysis for documenting the techniques used by the adversaries.<\/p>\n\n\n\n<p>Sample details:<\/p>\n\n\n<div class=\"wp-block-image size-full wp-image-1702\">\n<figure class=\"aligncenter\"><img decoding=\"async\" width=\"423\" height=\"114\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-1.webp\" alt=\"\" class=\"wp-image-2350\"\/><figcaption class=\"wp-element-caption\">Egregor Ransomware<\/figcaption><\/figure>\n<\/div>\n\n\n<p>\u2018q.dll\u2019 is the main ransomware file and other two non-PE files are batch scripts. Let\u2019s check the batch files:<\/p>\n\n\n\n<p>Batch file\u2019s MD5: 2A7FD15EBE1A1AC21E5F2AA889F26E46<\/p>\n\n\n\n<p>Contents:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"206\" height=\"237\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-2.webp\" alt=\"\" class=\"wp-image-2351\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"442\" height=\"399\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-3.webp\" alt=\"\" class=\"wp-image-2352\"\/><\/figure>\n\n\n\n<p>This script uses bitsadmin tool to transfer the ransomware dll file from the malicious IP address and stores the file inside the windows folder as \u2018q.dll\u2019. Then it calls for registering the dll file to perform the encryption.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/wp-content\/uploads\/2020\/12\/Egregor-4.png\" alt=\"\" class=\"wp-image-1718\"\/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"497\" height=\"327\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-5.webp\" alt=\"\" class=\"wp-image-2353\"\/><\/figure>\n<\/div>\n\n\n<p>Once the batch file registers this malicious dll (q.dll), the above snapshot shows cryptic data found in the subroutine.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"249\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-6.webp\" alt=\"\" class=\"wp-image-2354\"\/><\/figure>\n<\/div>\n\n\n<p>The IP address found inside this batch script: hxxp:\/\/ 45.153.242(.)129\/q.dll. The second batch file is a truncated file of the first batch, and it contains the command for registering the ransomware dll.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"541\" height=\"125\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-7.webp\" alt=\"\" class=\"wp-image-2355\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Analysis of the Ransomware sample<\/strong><\/h2>\n\n\n\n<p>Ransomware file q.dll \u2013 MD5: 3C18331989CB006506338ED1F838430D<\/p>\n\n\n\n<p>The file compiled using VC++ as like variants of Maze and Netwalker ransomware.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"353\" height=\"131\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-8.webp\" alt=\"\" class=\"wp-image-2356\"\/><\/figure>\n<\/div>\n\n\n<p>The export details can be found in the below snapshot:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"424\" height=\"152\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-9.webp\" alt=\"\" class=\"wp-image-2357\"\/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"259\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-10.webp\" alt=\"\" class=\"wp-image-2358\"\/><\/figure>\n<\/div>\n\n\n<p>Based on our analysis to find out the tactics and techniques used by this sample, we found it to be employing the following techniques:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Process Injection and Virtualization\/Sandbox Evasion (System Checks) as the part of defence evasion tactic<\/li>\n\n\n\n<li>File and directory discovery as the discovery tactic<\/li>\n\n\n\n<li>Shared modules as the execution tactic<\/li>\n<\/ul>\n\n\n\n<p>These techniques are often seen in ransomware malware sample using dll file. The sample has the functionality to detect the presence of virtual environment (VM aware functionality), it executes the anti-VM instructions which can be spotted in the dissected code mentioned in the snapshot.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"601\" height=\"336\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-11.webp\" alt=\"\" class=\"wp-image-2359\"\/><\/figure>\n<\/div>\n\n\n<p>We found the usage of FNV hashing to probably hide the strings in the code. The same technique we have observed in the ransomware families like Netwalker and Maze variants, (found the similar encoded strings), please refer the below snapshot:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"539\" height=\"131\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-12.webp\" alt=\"\" class=\"wp-image-2360\"\/><\/figure>\n<\/div>\n\n\n<p>Further, we observed CryptstringtobinaryA \u2013 from the API of crypt32.dll.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"382\" height=\"75\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-13.webp\" alt=\"\" class=\"wp-image-2361\"\/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"341\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-14.webp\" alt=\"\" class=\"wp-image-2362\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>CryptStringToBinaryA \u2013 Same tactics used as Maze ransomware<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"573\" height=\"418\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-15.webp\" alt=\"\" class=\"wp-image-2363\"\/><\/figure>\n<\/div>\n\n\n<p>In order to perform the decryption, there are levels of decryption that needs to be performed. We performed XOR operation in this code and found the below data.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"139\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-16.webp\" alt=\"\" class=\"wp-image-2364\"\/><\/figure>\n<\/div>\n\n\n<p>It appears to be base64 encoded data and decoding of that base64 encoded was carried out with the help of CryptStringToBinary. The same tactics which we have already written about for the Maze ransomware. &nbsp;The Maze ransomware reference sample details:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">MD5: BD9838D84FD77205011E8B0C2BD711E0<\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Latest Victim of Egregor Ransomware<\/strong><\/h2>\n\n\n\n<p>The most recent victim of the Egregor ransomware is <a href=\"https:\/\/threatpost.com\/kmart-egregor-ransomware\/161881\/\" target=\"_blank\" rel=\"noopener\">Kmart<\/a>, and prior to that it was TransLink from Vancouver and a popular game developer from Japan called Capcom.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"515\" height=\"850\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-17.webp\" alt=\"\" class=\"wp-image-2365\"\/><\/figure>\n<\/div>\n\n\n<p>Reference link: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/metro-vancouvers-transit-system-hit-by-egregor-ransomware\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.bleepingcomputer.com\/news\/security\/metro-vancouvers-transit-system-hit-by-egregor-ransomware\/<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"525\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-18.webp\" alt=\"\" class=\"wp-image-2367\"\/><\/figure>\n<\/div>\n\n\n<p>Reference link: <a href=\"https:\/\/www.tripwire.com\/state-of-security\/featured\/capcom-hacked-resident-evil-game-developer-discloses-cyber-attack\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.tripwire.com\/state-of-security\/featured\/capcom-hacked-resident-evil-game-developer-discloses-cyber-attack\/<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Threat Indicators<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>IOC details:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>File Hashes (MD5)<\/strong><\/td><\/tr><tr><td>2A7FD15EBE1A1AC21E5F2AA889F26E46<\/td><\/tr><tr><td>BCDB9B0346F803C6A2C7D13DB9105C24<\/td><\/tr><tr><td>3C18331989CB006506338ED1F838430D<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>We collected the hash details of the same variants in the following list:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>SHA256<\/strong><\/td><td><strong>MD5<\/strong><\/td><\/tr><tr><td>9fffabede0ef679970666f04184340437cd70bc8fe870ee8174713ececf32398<\/td><td>6a04bfcc5465b0164eed89b28f61a787<\/td><\/tr><tr><td>072ab57f9db16d9fb92009c8e10b176bd4a2eff01c3bc6e190020cf5a0055505<\/td><td>1c268458ec2e4b3f93241eb7fa5dba22<\/td><\/tr><tr><td>b027467332243c8186e59f68ff7c43c9e212d9e5074fedf003febcfedad4381a<\/td><td>53c9924df26b5043f91352f59a9ffe9f<\/td><\/tr><tr><td>004a2dc3ec7b98fa7fe6ae9c23a8b051ec30bcfcd2bc387c440c07ff5180fe9a<\/td><td>5f9fcbdf7ad86583eb2bbcaa5741d88a<\/td><\/tr><tr><td>7caed5f406445c788543f55af6d98a8bc4f0c104e6a51e2564dd37b6a485cc18<\/td><td>b554791b5b161c34b0a7d26e34a88e60<\/td><\/tr><tr><td>2d01c32d51e4bbb986255e402da4624a61b8ae960532fbb7bb0d3b0080cb9946<\/td><td>b9dcee839437a917dde60eff9b6014b1<\/td><\/tr><tr><td>605c2047be7c4a17823ad1fa5c1f94fd105721fce3621dc9148cd3baf352938e<\/td><td>d1bd2fed0f6947dcb23e4c3da98a772e<\/td><\/tr><tr><td>c1c4e677b36a2ee6ae858546e727e73cc38c95c9024c724f939178b3c03de906<\/td><td>1cce0c0d67fe7f51f335a12138698403<\/td><\/tr><tr><td>28f3f5a3ea270d9b896fe38b9df79a6ca430f5edab0423b3d834cf8d586f13e6<\/td><td>43445fbe21cf3512724646a284d3e5d7<\/td><\/tr><tr><td>2d563dd113a02fdf452544ae2fd7c94162be6db8fb7a287a3474a6ab998159fd<\/td><td>3c18331989cb006506338ed1f838430d<\/td><\/tr><tr><td>a5989c480ec6506247325652a1f3cb415934675de3877270ae0f65edd9b14d13<\/td><td>520ee511034717f5499fb66f9c0b76a5<\/td><\/tr><tr><td>3fc382ae51ceca3ad6ef5880cdd2d89ef508f368911d3cd41c71a54453004c55<\/td><td>c3c7a97da396085eb48953e638c3c9c6<\/td><\/tr><tr><td>319ec80eae65c1d39df27c80b52fe7fe1fadc6e9ceabf72f57d1b29e0467ac02<\/td><td>1989da2404fb8006dc6a71d1777b1521<\/td><\/tr><tr><td>b9b71eb04d255b21e3272eef5f4c15d1c208183748dfad3569efd455d87879c6<\/td><td>e5c83994fb7a6ab58291ac93755d93a6<\/td><\/tr><tr><td>4c9e3ffda0e663217638e6192a093bbc23cd9ebfbdf6d2fc683f331beaee0321<\/td><td>a654b3a37c27810db180822b72ad6d3e<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>YARA rules:<\/strong><\/h3>\n\n\n\n<p>import &#8220;pe&#8221;<\/p>\n\n\n\n<p>import &#8220;hash&#8221;<\/p>\n\n\n\n<p>rule ransom_egregor {<\/p>\n\n\n\n<p>hash = &#8220;5f9fcbdf7ad86583eb2bbcaa5741d88a&#8221;<\/p>\n\n\n\n<p>strings:<\/p>\n\n\n\n<p>$p1 = &#8220;ewdk.pdb&#8221; fullword ascii<\/p>\n\n\n\n<p>$p2 = &#8220;testbuild.pdb&#8221; fullword ascii<\/p>\n\n\n\n<p>$s1 = &#8220;M:\\\\&#8221; nocase ascii<\/p>\n\n\n\n<p>$s2 = &#8220;1z1M9U9&#8221; fullword wide<\/p>\n\n\n\n<p>$s3 = &#8220;C:\\\\Logmein\\\\{888-8888-9999}\\\\Logmein.log&#8221; fullword wide<\/p>\n\n\n\n<p>condition:<\/p>\n\n\n\n<p>uint16(0) == 0x5a4d and filesize &lt; 2000KB and<\/p>\n\n\n\n<p>hash.sha256(pe.rich_signature.clear_data) == &#8220;b030ed1a7ca222a0923a59f321be7e55b8d0fc24c1134df1ba775bcf0994c79c&#8221; or<\/p>\n\n\n\n<p>(pe.sections[4].name == &#8220;.gfids&#8221; and pe.sections[5].name == &#8220;.00cfg&#8221;) and<\/p>\n\n\n\n<p>(any of ($p*) or 2 of ($s*))<\/p>\n\n\n\n<p>}<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Screenshot of Egregor tor site:<\/strong><\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"365\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Egregor-19.webp\" alt=\"\" class=\"wp-image-2368\"\/><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Egregor ransomware is a new strain of ransomware found in the wide range of attacks seen in many global organizations in the last couple of weeks. They found to be using similar code obfuscation and packed payloads to escape security detection as Sekhmet. It is a clear indication that Egregor ransomware is a variant of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2369,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2340"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2340\/revisions"}],"predecessor-version":[{"id":4248,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2340\/revisions\/4248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2369"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}