{"id":2860,"date":"2024-09-25T20:12:40","date_gmt":"2024-09-25T20:12:40","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2860"},"modified":"2025-07-29T06:41:35","modified_gmt":"2025-07-29T06:41:35","slug":"scarab-sets-a-new-standard-for-rapid-fire-ransomware","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/scarab-sets-a-new-standard-for-rapid-fire-ransomware\/","title":{"rendered":"Scarab sets a new standard for rapid fire ransomware"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Scarab_beetle_3171-v2.webp\" alt=\"Scarab_beetle\" class=\"wp-image-2871\" style=\"width:486px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>When it comes to \u2018scatter-gun\u2019 distribution methods, a ransomware strain discovered late last year is taking spray-and-pray to new heights. The latest variant of Scarab ransomware was discovered <a href=\"https:\/\/blogs.forcepoint.com\/security-labs\/massive-email-campaign-spreads-scarab-ransomware\" target=\"_blank\" rel=\"noopener\">last November<\/a> and was clocked using the Necurs botnet to send 12.5 million spam emails in just six hours \u2013 more than 2 million spam emails per hour! \u00a0<br><br>Its primary targets were .com and .co.uk top-level domains, but domains in Australia, France, Germany and \u00a0New Zealand were also targeted. Despite its discovery last year, we witnessed the strain still being used to target victims on January 18, 2018.<br><br>Necurs is one of the world\u2019s largest botnets with between 5 and 6 million infected hosts online monthly. In the past, it has been used to distribute other ransomware strains, Locky being the most notable. Below is a list of malware campaigns Necurs has distributed:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"873\" height=\"511\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-5-2.webp\" alt=\"\" class=\"wp-image-2862\"\/><\/figure>\n\n\n\n<p><br><br>Scarab\u2019s spam email contains a malicious VBScript downloader (md5: c3d641dc9dd08d592d66f8091ef76de4), compressed with 7zip which pulls down the final payload. The ransomware then drops the file: %<strong>Application Data<\/strong>%<strong>\\sevnz.exe<\/strong><br><br>After this initial step, Scarab then proceeds to:<br><br>\u2022\u00a0\u00a0 \u00a0Create a registry entry as an autostart mechanism in order to maintain persistence<br><br>\u2022\u00a0\u00a0 \u00a0Scan all drives to check file extensions\u00a0<br><br>\u2022\u00a0\u00a0 \u00a0Read and encrypt all files using AES encryption with the .scarab extension\u00a0<br><br>\u2022\u00a0\u00a0 \u00a0Delete volume shadow copies, system backups and remove Windows recovery mode<br><br>Once installed and executed on the victim&#8217;s computer, Scarab connects to a website that provides the attacker with the victim&#8217;s IP address and other machine information so tabs can be kept on the victim\u2019s machine.<br><br>Once encryption is complete, the ransomware drops a ransom note with the filename &#8220;<em>IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT<\/em>&#8221; within each affected directory.<br><br><strong>File details<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>File type<\/td><td>Portable executable (.exe) file<\/td><\/tr><tr><td>Md5 hash<\/td><td>9a02862ac95345359dfc3dcc93e3c10e<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis<\/strong><br><br>Static analysis uncovered a number of attributes that give away the sample\u2019s malicious nature, including checks for free disk space, virtual environment detection, startup process checks, windows command line access, and attempting to connect to the internet:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"623\" height=\"598\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-5-2.webp\" alt=\"\" class=\"wp-image-2863\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"592\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-4-3.webp\" alt=\"\" class=\"wp-image-2864\"\/><\/figure>\n\n\n\n<p><strong>Dynamic analysis<\/strong><br><br>After executing the sample in a dedicated virtual environment, we were able to follow Scarab\u2019s infection process step-by-step. The chain outlined below gives a high-level description of the processes initiated during infection:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"261\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-2-1.webp\" alt=\"\" class=\"wp-image-2870\"\/><\/figure>\n\n\n\n<p>When we executed the sample &#8220;sevnz.exe&#8221;, it initiates &#8220;mshta.exe&#8221; which copies the file &#8220;sevnz.exe&#8221; to the location &#8220;%Application Data%\\sevnz.exe&#8221;.<br><br>Next, &#8220;cmd.exe&#8221; is initiated which launches &#8220;wmic.exe&#8221; \u2013 the latter of which deletes system backups.<br><br>A second instance of &#8220;cmd.exe&#8221; also starts up with the child process &#8220;vssadmin.exe&#8221; \u2013 this is used to delete the system\u2019s volume shadow copies.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"135\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-4-3.webp\" alt=\"\" class=\"wp-image-2865\"\/><\/figure>\n\n\n\n<p>After all these processes have been executed, sevnz.exe and mshta.exe continue running and remain persistent.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"852\" height=\"75\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-3-3.webp\" alt=\"\" class=\"wp-image-2866\"\/><\/figure>\n\n\n\n<p>Ultimately, all data present in the victim machine is encrypted with the .scarab extension. Below is the ransom note as seen by the victim (the version we uncovered appears to be in an unsupported Cyrillic script):<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1016\" height=\"581\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-3-3.webp\" alt=\"\" class=\"wp-image-2867\"\/><\/figure>\n\n\n\n<p>The text file containing the ransom message is also dropped in various other locations:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"306\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-3-1.webp\" alt=\"\" class=\"wp-image-2868\"\/><\/figure>\n\n\n\n<p>Sevnz.exe is also replicated into the following location which ensures it remains running across system reboots, encrypting data continuously. This feature means we weren\u2019t able to capture malware artifacts such as pcap, further files\/malware dropped, etc.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"793\" height=\"343\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-3-1.webp\" alt=\"\" class=\"wp-image-2869\"\/><\/figure>\n\n\n\n<p>Below is the registry entry created at autostart:<br><br><em>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnceuSjBVNE = &#8220;%Application Data%\\sevnz.exe<\/em><\/p>\n\n\n\n<p><strong>Indicators of compromise<\/strong><br><br>VBScript Downloader: <em>c3d641dc9dd08d592d66f8091ef76de4<\/em><br><br>Malware sample analyzed: 9a02862ac95345359dfc3dcc93e3c10e<\/p>\n\n\n\n<p><strong>Mitigation<\/strong><br><br>As with most ransomware strains, Scarab relies on the victim opening a weaponized attachment. Exercise caution when receiving any emails from unknown senders and do not open attachments or follow links without first verifying the email\u2019s source.<br><br>It is also important to routinely back up important files to external storage devices to ensure you\u2019re able to restore your files from a saved version in the event you fall victim to ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to &lsquo;scatter-gun&rsquo; distribution methods, a ransomware strain discovered late last year is taking spray-and-pray to new heights. The latest variant of Scarab ransomware was discovered last November and was clocked using the Necurs botnet to send 12.5 million spam emails in just six hours &ndash; more than 2 million spam emails per [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2871,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2860"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2860\/revisions"}],"predecessor-version":[{"id":4317,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2860\/revisions\/4317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2871"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}