{"id":2675,"date":"2024-09-25T19:29:11","date_gmt":"2024-09-25T19:29:11","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2675"},"modified":"2025-07-29T06:08:08","modified_gmt":"2025-07-29T06:08:08","slug":"shade-ransomware-returns-to-throw-shade-at-authorities","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/shade-ransomware-returns-to-throw-shade-at-authorities\/","title":{"rendered":"Shade ransomware returns to throw shade at authorities"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"259\" height=\"194\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/images.webp\" alt=\"Shade ransomware returns to throw shade at authorities\" class=\"wp-image-2710\" style=\"width:729px;height:auto\"\/><figcaption class=\"wp-element-caption\">Shade ransomware returns to throw shade at authorities<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Despite the collective efforts of Europol, Intel, Kasperksy, and the Dutch cybercrime unit <a href=\"https:\/\/www.theregister.co.uk\/2016\/07\/25\/euro_cops_intel_and_kaspersky_slay_shade_ransomware\/\" target=\"_blank\" rel=\"noopener\">to eradicate the Shade ransomware<\/a>, the strain has returned and its authors are now mocking the authorities who tried to bring it down. &nbsp;<br><br>Last year\u2019s attempted takedown was performed under the banner of the <a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"noopener\">No More Ransom<\/a> initiative, whose aim is to attack ransomware control systems and publish free decryption keys.<br><br>While initially successfully, Shade has returned and added the extension \u201c.no_more_ransom\u201d (among others) to encrypted files \u2013 a clear swipe at last year\u2019s venture.<br><br>LMNTRIX Labs discovered the latest sample earlier this month. This new variant has been predominately targeting users in the UK, France, Germany, Italy, Ukraine, and Russia.&nbsp;<br><br><strong>Overview<\/strong><br><br>Shade, aka Troldesh, belongs to a family of ransomware whose primary attack vectors are either malicious spam or exploit kits. Exploit kit attacks are particularly damaging as the victim does not necessarily have to open any file for the infection to occur \u2013 a single visit to any infected website is enough to initiate the infection process.<br><br>In its more mundane form, Shade spreads via emails containing malicious links which download a zipped JavaScript (JS) file or a Word document. When the JavaScript file is executed, it installs the ransomware.<br><br>After successful infection, Shade encrypts most files stored on the infected machine, changes the desktop background and creates a .txt file which includes the ransom demand and directions on how to pay.<br><br>The latest version adds the .crypted000007, .no_more_ransom, .better_call_saul, .breaking bad, .heisenberg, .windows10, .7h9r, .xtbl, .ytbl or .da_vinci_code extensions to encrypted files.<br><br>Shade also connects with multiple Command and Control servers in order to receive configuration data and other information about the victim\u2019s computer.&nbsp;<br><br><strong>File Details<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File Type<\/td><td>Portable Executable (PE) &nbsp;File<\/td><\/tr><tr><td>Md5 hash&nbsp;<\/td><td>15ebea98889b4d50c8db1c3b9d09b716<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis&nbsp;<\/strong><br><br>Once executed, Shade\u2019s functionality includes:<br><br>\u2022&nbsp;&nbsp; &nbsp;Creating registries<br><br>\u2022&nbsp;&nbsp; &nbsp;Deleting files<br><br>\u2022&nbsp;&nbsp; &nbsp;Dropping further malware<br><br>\u2022&nbsp;&nbsp; &nbsp;Gaining command line (cmd.exe) access<br><br>\u2022&nbsp;&nbsp; &nbsp;Confirming file version and size before encrypting<br><br>\u2022&nbsp;&nbsp; &nbsp;Shutting down the computer after successful infection<br><br>Full functionality is illustrated below:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"991\" height=\"667\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-2-2.webp\" alt=\"\" class=\"wp-image-2688\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"997\" height=\"669\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-2-2.webp\" alt=\"\" class=\"wp-image-2689\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"722\" height=\"347\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-2-2.webp\" alt=\"\" class=\"wp-image-2690\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"685\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-2-2-1024x685.webp\" alt=\"\" class=\"wp-image-2692\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"982\" height=\"643\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-1-2.webp\" alt=\"\" class=\"wp-image-2693\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"982\" height=\"643\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-1-2.webp\" alt=\"\" class=\"wp-image-2693\"\/><\/figure>\n\n\n\n<p>&nbsp; &nbsp; &nbsp;&nbsp;<br><br><strong>Dynamic Analysis&nbsp;<\/strong><br><br>LMNTRIX researchers executed Shade in a dedicated virtual environment in order to analyse its behavior in terms of processes being created, files dropped\/deleted, registry values added\/deleted, and network communications (Command and Control servers involved), etc.<br><br>After execution, Shade (or sd01.exe) starts another child process with the same name, which disappears after some time:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"839\" height=\"671\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-1-2.webp\" alt=\"\" class=\"wp-image-2694\"\/><\/figure>\n\n\n\n<p><br><br>The initial process then contacts the following IP addresses:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-35.webp\" alt=\"\" class=\"wp-image-2695\"\/><\/figure>\n\n\n\n<p><br>As the infection continues, the number of CnC servers contacted quickly increases. The multiple CnC callbacks and malware downloads indicates the infected machine is also conscripted to act as part of Shade\u2019s botnet network. This could also be seen as a further slight at the authorities behind last year\u2019s take down effort, as the latest variant\u2019s expansive CnC infrastructure would be much harder to eradicate:<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"937\" height=\"681\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-31.webp\" alt=\"\" class=\"wp-image-2696\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"293\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-30.webp\" alt=\"\" class=\"wp-image-2697\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"867\" height=\"663\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-21.webp\" alt=\"\" class=\"wp-image-2699\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"642\" height=\"545\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-16.webp\" alt=\"\" class=\"wp-image-2700\"\/><\/figure>\n\n\n\n<p>Next, more executable processes were initiated\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"853\" height=\"683\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-13.webp\" alt=\"\" class=\"wp-image-2701\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"914\" height=\"695\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14-10.webp\" alt=\"\" class=\"wp-image-2702\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"907\" height=\"120\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/15-8.webp\" alt=\"\" class=\"wp-image-2703\"\/><\/figure>\n\n\n\n<p>&nbsp;<br>\u2026 which lead to even more CnC callbacks:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"929\" height=\"681\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/16-7.webp\" alt=\"\" class=\"wp-image-2704\"\/><\/figure>\n\n\n\n<p><br><br>Finally, the user\u2019s files are encrypted and the victim\u2019s desktop is changed to display the ransom note:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1010\" height=\"653\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-6.webp\" alt=\"\" class=\"wp-image-2705\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-6.webp 1010w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-6-280x180.webp 280w\" sizes=\"(max-width: 1010px) 100vw, 1010px\" \/><\/figure>\n\n\n\n<p><br><br><strong>Memory Analysis<\/strong><br><br>Next, we took an image of the RAM for further investigation and found the main executable process remained persistent, along with multiple child processes which kicked in after the initial executable was launched:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"495\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/18-4-1024x495.webp\" alt=\"\" class=\"wp-image-2706\"\/><\/figure>\n\n\n\n<p><br><\/p>\n\n\n\n<p>We were also able to see all the active connections Shade called out to, as well as the number of instances of the executable file:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"373\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/19-3-1024x373.webp\" alt=\"\" class=\"wp-image-2707\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"609\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/20-3-1024x609.webp\" alt=\"\" class=\"wp-image-2708\"\/><\/figure>\n\n\n\n<p><br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"243\" class=\"wp-image-2709\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/21-2.webp\" alt=\"\">&nbsp; &nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"436\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/21-2-1024x436.webp\" alt=\"\" class=\"wp-image-2709\"\/><\/figure>\n\n\n\n<p><br><strong>Command and Control<\/strong><br><br>Below are the IP addresses involved during Shade\u2019s infection cycle \u2013 there were 19 in total:<br><br>208.83.223.34&nbsp;&nbsp; &nbsp;<br><br>86.59.21.38<br><br>142.44.210.91&nbsp;<br><br>87.239.81.27&nbsp;<br><br>93.180.156.84<br><br>128.31.0.39&nbsp;<br><br>194.109.206.212<br><br>86.59.21.38<br><br>204.9.50.25<br><br>145.239.82.204<br><br>178.254.25.6<br><br>185.82.216.5<br><br>62.210.123.24<br><br>212.201.68.152<br><br>94.23.199.191&nbsp;<br><br>198.12.145.239<br><br>209.99.40.223<br><br>67.23.244.66<br><br>208.91.198.231<br><br>MD5 hash of the file analyzed: 15ebea98889b4d50c8db1c3b9d09b716&nbsp;<br><br><strong>Dropped files<\/strong><br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\test\\AppData\\Local\\&lt;user-name&gt;\\077F8DB3.exe&nbsp;<br><br>o&nbsp;&nbsp; &nbsp;md5: c1182260e1ba1f930e591a98e75552d9<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\test\\AppData\\Local\\&lt;user-name&gt;\\31C13E52.exe&nbsp;<br><br>o&nbsp;&nbsp; &nbsp;md5: d668221d749214aac4e04d3daae07f7f<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\test\\AppData\\Local\\&lt;user-name&gt;\\DD23EF15.exe&nbsp;<br><br>o&nbsp;&nbsp; &nbsp;md5: 8fbe9a961300fb62df587ed708160655 &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\test\\AppData\\Local\\&lt;user-name&gt;\\FE87884C.exe&nbsp;<br><br>o&nbsp;&nbsp; &nbsp;md5: 85d881193d41b4fcb0a27b6e2243a0dc<br><br><strong>Protection Measures&nbsp;<\/strong><br><br>Given the additional extensions added to encrypted files, last year\u2019s nomoreransom.org decryption key may no longer decrypt files scrambled by Shade. Below are general cyber hygiene tips to minimize the chances of any infection, or enable a quick recovery in the event you do fall victim to ransomware:<br><br>\u2022&nbsp;&nbsp; &nbsp;Keep frequent file back-ups on an external memory device or cloud-based storage.<br><br>\u2022&nbsp;&nbsp; &nbsp;Keep security programs updated.<br><br>\u2022&nbsp;&nbsp; &nbsp;Avoid visiting websites considered unsafe, particularly those with pirated or illegal content.<br><br>\u2022&nbsp;&nbsp; &nbsp;Use a reliable anti-spam filter to block spam emails with malicious file attachments from ever entering your inbox.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite the collective efforts of Europol, Intel, Kasperksy, and the Dutch cybercrime unit to eradicate the Shade ransomware, the strain has returned and its authors are now mocking the authorities who tried to bring it down. &nbsp; Last year&rsquo;s attempted takedown was performed under the banner of the No More Ransom initiative, whose aim is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2710,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2675"}],"version-history":[{"count":5,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2675\/revisions"}],"predecessor-version":[{"id":4304,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2675\/revisions\/4304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2710"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}