{"id":2618,"date":"2024-09-25T19:02:36","date_gmt":"2024-09-25T19:02:36","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2618"},"modified":"2025-07-29T05:37:24","modified_gmt":"2025-07-29T05:37:24","slug":"threat-advisory-badrabbit-ransomware","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/threat-advisory-badrabbit-ransomware\/","title":{"rendered":"Threat Advisory: BadRabbit Ransomware"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"389\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/hare-2583031_960_720.webp\" alt=\"Threat Advisory: BadRabbit Ransomware\" class=\"wp-image-2622\"\/><\/figure>\n<\/div>\n\n\n<p>This year\u2019s relentless ransomware rampage continues to rage on \u2013 this time the culprit has been dubbed \u2018BadRabbit\u2019.<br><br>The variant has been spreading through Russia, Ukraine, and other Eastern European countries \u2013 specifically targeting corporate networks. So far, the computer systems for the Kiev Metro, Ukraine\u2019s Odessa International Airport, several Russian media outlets, and others have been affected, with systems encrypted and a 0.5 bitcoin (about $280) ransom being demanded to restore file access.<br><br>Bad Rabbit has been initiated through drive-by downloads from a malicious PE file called \u201cinstall_flash_player.exe\u201d. Upon execution, the malicious file drops Mutex files which initiate the infection.<br><br>A drive-by download involves injecting Javascript into a website\u2019s HTML body or a .js file. Then, when a victim visits a compromised site, a pop-up appears, saying Flash Player needs to be updated, essentially tricking users into installing the malware themselves.\u00a0<br><br><strong>Propagation \u2013 drive-by download:<\/strong><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"792\" height=\"404\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-4-1.webp\" alt=\"\" class=\"wp-image-2619\"\/><\/figure>\n\n\n\n<p>\u00a0<br><br>The reason Bad Rabbit has been spreading like, well, rabbits, is because it uses the same leaked NSA exploit \u2013 EternalBlue \u2013 \u00a0which helped WannaCry and Petya wreak havoc earlier this year.<br><br>EternalBlue is relatively easy to protect against. The exploit targets servers with SMB network sharing exposed to the Internet which is a feature that can (and should) be deactivated.<br><br><strong>Static File Details:<\/strong><br><br>From the Static File Details we can see the different file type names used in the campaign. The Copyright, Description, and Internal name section are spoofed to hide the malicious nature of the file:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"889\" height=\"476\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-4-1.webp\" alt=\"\" class=\"wp-image-2620\"\/><\/figure>\n\n\n\n<p> \u00a0<br><br><strong>Process Diagram:<\/strong><br><br>The root cause process is PID:2984 , which is called from cmd.exe (PID 3608) before process injection for schtasks.exe (PID 3620) kicks in which executes the ransomware:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"488\" height=\"294\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-4-1.webp\" alt=\"\" class=\"wp-image-2621\"\/><\/figure>\n\n\n\n<p>\u00a0<br><br><strong>Encryption File type:<\/strong><br><br>.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.eml.fdb.gz.h.hdd.hpp.hxx.iso.java.jfif.jpe.jpeg.jpg.js.kdbx.key.mail.mdb.msg.nrg.odc.odf.odg.odi.odm.odp.ods.odt.ora.ost.ova.ovf.p12.p7b.p7c.pdf.pem.ppt.rtf.xls\u200b<br><br>\u200b\u200b\u200b\u200b\u200b\u200b<strong>IOC:<\/strong><br><br>http:\\\/\\\/1dnscontrol[.]com\/flash_install[.]php<br><br>Policy: C:\\Windows\\infpub.dat \u00a0[Block File creation &amp; execution]<br><br>Argumentiru[.]com<br><br>Fontanka[.]ru<br><br>Adblibri[.]ro<br><br>Spbvoditel[.]ru<br><br>Grupovo[.]bg<br><br>inematurk[.]com<br><br>http:\\\/\\\/185[.]149[.]120[.]3\/scholargoogle\/<br><br><strong>MD5:\u00a0<\/strong><br><br>fbbdc39af1139aebba4da004475e8839<br><br>1d724f95c61f1055f0d02c2154bbccd3<br><br>b14d8faf7f0cbcfad051cefe5f39645f\u200b\u200b\u200b\u200b\u200b\u200b\u200b<br><br><strong>Recommendations:<\/strong><br><br>Key recommendations to mitigate against BadRabbit include:<br><br>\u2022\u00a0\u00a0 \u00a0Disable WMI service (if it\u2019s possible in your environment) to prevent the malware from spreading over your network.<br><br>\u2022\u00a0\u00a0 \u00a0Disable SMB network sharing<br><br>\u2022\u00a0\u00a0 \u00a0Patch the system from Vulnerability MS17-010.<br><br>\u2022\u00a0\u00a0 \u00a0The Perimeter rule can be implemented on the Perimeter device (such as Proxy), to stop the download or communication of unauthorized Flash-player updates. See below:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Title: Flash Player Update from Suspicious Location<\/strong> <strong>description: Detects a flashplayer update from an unofficial location<\/strong> <strong>logsource:<\/strong> <strong>&nbsp;&nbsp;&nbsp; category: proxy<\/strong> <strong>detection:<\/strong> <strong>&nbsp;&nbsp;&nbsp; selection:<\/strong> <strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cs-uri-query:<\/strong> <strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; &#8216;*\/install_flash_player.exe&#8217;<\/strong> <strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; &#8216;*\/flash_install.php*&#8217;<\/strong> <strong>&nbsp;&nbsp;&nbsp; filter:<\/strong> <strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cs-uri-query: &#8216;*.adobe.com\/*&#8217;<\/strong> <strong>&nbsp;&nbsp;&nbsp; condition: selection and not filter<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>In addition, backing up files regularly ensures you can recover important data in the event you fall victim to any ransomware attack.<br><br>&nbsp;<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year&rsquo;s relentless ransomware rampage continues to rage on &ndash; this time the culprit has been dubbed &lsquo;BadRabbit&rsquo;. The variant has been spreading through Russia, Ukraine, and other Eastern European countries &ndash; specifically targeting corporate networks. So far, the computer systems for the Kiev Metro, Ukraine&rsquo;s Odessa International Airport, several Russian media outlets, and others [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2622,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2618"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2618\/revisions"}],"predecessor-version":[{"id":4296,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2618\/revisions\/4296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2622"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}