{"id":2553,"date":"2024-09-25T18:51:43","date_gmt":"2024-09-25T18:51:43","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2553"},"modified":"2025-07-29T03:53:54","modified_gmt":"2025-07-29T03:53:54","slug":"karo-ransomware-is-bad-for-your-health","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/karo-ransomware-is-bad-for-your-health\/","title":{"rendered":"Karo ransomware is bad for your health"},"content":{"rendered":"\n<p>While the recent Petya (NotPetya?) pandemic made the world recognise just how devastating ransomware can be, another variant slipped largely under the radar. &nbsp;&nbsp;<br><br>This variant, dubbed \u2018Karo\u2019, may not have shut down hospitals and other critical services, but it\u2019s still worth examining because it\u2019s essentially a mash up of several other successful strains.&nbsp;<br><br>Karo uses the classic \u2018phishing email, word document attachment, malicious macro\u2019 propagation formula (we\u2019ve covered malicious macros in more depth, so <a href=\"https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=28\">read here<\/a> if you\u2019d like more information on how it works), though it also includes a slight twist; the document is password protected.<br><br>This password protection helps the document evade security controls by allowing it to bypass many sandbox environments. The password is generally included in the body of the phishing email so the victim can open the document and enable macros.&nbsp;<br><br>I won\u2019t spend too much delving into its background, instead let\u2019s jump straight into the analysis.&nbsp;<br><br><strong>Static analysis<\/strong><br><br>The sample we\u2019re analysing today is \u2018svchost.exe\u2019:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Name<\/td><td>Svchost.exe<\/td><\/tr><tr><td>File Size<\/td><td>708kb<\/td><\/tr><tr><td>Md5sum&nbsp;<\/td><td>51c7fff87a2fc5d62a31990643a5083c<\/td><\/tr><tr><td>Sha1 hash<\/td><td>e65ca51e8d82a5dfac95d858d0f497824e84cc1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Below, static analysis highlights multiple suspicious strings:<br><br><img fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"589\" class=\"wp-image-2556\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-1-1.webp\" alt=\"\"><br><br>When further examined, these strings illuminate the ransomware\u2019s specific functionality:<br><br><img decoding=\"async\" width=\"700\" height=\"446\" class=\"wp-image-2557\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-1-1.webp\" alt=\"\"><br><br>Once executed, Karo checks for the username and machine name, as well as for the %TEMP% and %appdata folders:<br><br><img decoding=\"async\" width=\"600\" height=\"455\" class=\"wp-image-2558\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-1-1.webp\" alt=\"\">\u00a0<br><br>Here we see the folder\u2019s target path:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"81\" class=\"wp-image-2559\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-1-1.webp\" alt=\"\"><br><br>Next, Karo confirms file attributes\u2026<br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"533\" class=\"wp-image-2560\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-1-1.webp\" alt=\"\"><br><br>\u2026 and then it tries to retrieve process information:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"427\" class=\"wp-image-2561\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-1-1.webp\" alt=\"\">\u00a0<br><br><strong>Dynamic analysis<\/strong><br><br>As with all dynamic analysis, the first step is to open the malware:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"34\" class=\"wp-image-2562\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-1-1.webp\" alt=\"\"><br><br>Once triggered, it contacts multiple Tor domains in order to download and execute \u2018Microsoft.vshub.32.exe\u2019:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Name<\/td><td>Microsoft.vshub.32.exe<\/td><\/tr><tr><td>File size<\/td><td>3.12 MB<\/td><\/tr><tr><td>Md5sum<\/td><td>bc301e7d26c4ed498e9f966996fc4370<\/td><\/tr><tr><td>Sha1 hash<\/td><td>dcdb0deca2ed47b78263631addea0e07af51b4da<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Below we see the specific Tor domains that Karo calls out to:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"425\" class=\"wp-image-2563\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-1-1.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"238\" class=\"wp-image-2564\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-1-1.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"45\" class=\"wp-image-2565\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-1-1.webp\" alt=\"\">\u00a0<br><br>Next, microsoft.vshub.32.exe uses cmd.exe, to initiate a ping request \u2013 our sample favoured Google Chrome \u2013 to connect to several more Command and Control (C2) servers:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"52\" class=\"wp-image-2566\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-1-1.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"327\" class=\"wp-image-2567\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-15.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"223\" class=\"wp-image-2568\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-12.webp\" alt=\"\"><br><br>When network traffic is viewed in the pcap file, we see even more domains:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"460\" class=\"wp-image-2569\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14-9.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"291\" class=\"wp-image-2570\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/15-7.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"302\" class=\"wp-image-2571\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/16-6.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"173\" class=\"wp-image-2572\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-5.webp\" alt=\"\">\u00a0<br><br>When this process is complete, the encryption starts. Our sample displayed the following ransom demand via Google Chrome:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"347\" class=\"wp-image-2573\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/18-3.webp\" alt=\"\">\u00a0<br><br>Another demand was also displayed on the machine\u2019s desktop:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"316\" class=\"wp-image-2574\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/19-2.webp\" alt=\"\">\u00a0<br><br>To achieve this, the following files were dropped onto the user\u2019s system:\u00a0<br><br>C:\\users\\&lt;User-name>\\Appdata\\Local\\Temp<br><br>C:\\users\\&lt;User-name>\\Appdata\\Local\\Temp\\Tor<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"332\" class=\"wp-image-2575\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/20-2.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"300\" class=\"wp-image-2576\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/21-1.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"183\" class=\"wp-image-2577\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/22-1.webp\" alt=\"\">\u00a0<br><br>Below is a list of indicators of compromise (IOCs):<br><br><strong>IP Addresses:<\/strong><br><br>212.83.154.33<br><br>86.59.21.38<br><br>185.100.86.128<br><br>148.251.14.214<br><br>131.188.40.188<br><br>176.158.236.102<br><br>134.19.177.109<br><br>216.58.197.78<br><br>85.248.227.164<br><br>199.254.238.52<br><br>178.62.197.82<br><br>188.40.128.246<br><br>176.158.236.102<br><br>71.248.178.98<br><br>5.189.153.185<br><br><strong>Domains:<\/strong><br><br>6vas[.]com<br><br>usr2u2f5be2tty3ihzhl[.]com<br><br>zjuwaw35xhml5h2nvjrud[.]com<br><br>7xly4htpe2p2yjxfgs[.]com<br><br>51ptvhkd5kguelg373slgjqx5[.]com<br><br><strong>Dropped file locations:<\/strong><br><br>C:\\users\\&lt;User-name>\\Appdata\\Local\\Temp<br><br>C:\\users\\&lt;User-name>\\Appdata\\Local\\Temp\\Tor<br><br><strong>MD5 hashes:<\/strong><br><br>51c7fff87a2fc5d62a31990643a5083c<br><br>bc301e7d26c4ed498e9f966996fc4370<br><br>Here is where I\u2019d usually list the specific steps one can take to mitigate their exposure to Karo, but I\u2019ve just about run out of ways to say \u201cdon\u2019t open suspicious emails, keep your software up-to-date, and back up your files\u201d. Instead, here is a list of things named \u2018Karo\u2019:<br><br>\u2022\u00a0\u00a0 \u00a0Ethnic groups in Ethiopa and Indonesia<br><br>\u2022\u00a0\u00a0 \u00a0A radio station in Oregon<br><br>\u2022\u00a0\u00a0 \u00a0A sweet syrup made of corn<br><br>\u2022\u00a0\u00a0 \u00a0A native New Zealand shrub<br><br>\u2022\u00a0\u00a0 \u00a0Highly-ranked samurai officials in feudal Japan<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the recent Petya (NotPetya?) pandemic made the world recognise just how devastating ransomware can be, another variant slipped largely under the radar. &nbsp;&nbsp; This variant, dubbed &lsquo;Karo&rsquo;, may not have shut down hospitals and other critical services, but it&rsquo;s still worth examining because it&rsquo;s essentially a mash up of several other successful strains.&nbsp; Karo [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2578,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2553","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2553"}],"version-history":[{"count":2,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2553\/revisions"}],"predecessor-version":[{"id":4265,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2553\/revisions\/4265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2578"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}