Crysis Threat Actor Installing Venus Ransomware Through RDP – ASEC BLOG

ASEC reports that the Crysis threat actor is deploying Venus ransomware in attacks, using RDP to access externally exposed systems and then dropping multiple malware strains. The operation leverages NirSoft tools and Mimikatz for credential access, conducts network scanning, and moves laterally to encrypt endpoints with ransom notes left behind. #CrysisRansomware #VenusRansomware #Mimikatz #NirSoft #RDP #AhnLab

Keypoints

  • RDP is the primary attack vector used for initial access and later movement to other systems.
  • The actor alternates between Crysis and Venus ransomware, encrypting systems and leaving ransom notes.
  • NirSoft utilities and Mimikatz are deployed to collect credentials and facilitate lateral movement.

MITRE Techniques

  • [T1021.001] Remote Services – RDP – β€œThreat actors can use the obtained account credentials to log in to the system through RDP, allowing them to gain control over the system in question and perform a variety of malicious actions.”
  • [T1046] Network Service Scanning – β€œAfter the threat actor takes over the system via RDP, the above tools are used to scan the network to check if the infected system is part of a specific network.”
  • [T1003] Credential Dumping – β€œMimikatz can be used in this process.”
  • [T1486] Data Encrypted for Impact – β€œThe threat actor ultimately executed Crysis to encrypt the system, and after recognizing failure after a few hours, retried the attack using Venus.”
  • [T1490] Inhibit System Recovery – β€œDeletes volume shadow copies.”

Indicators of Compromise

  • [File Name] context – 1.exe_, bild.exe_
  • [MD5] context – 67b1a741e020284593a05bc4b1a3d218, 786ce74458720ec55b824586d2e5666d
  • [Email] threat actor contact – datacentreback@msgsafe[.]io, [email protected]

Read more: https://asec.ahnlab.com/en/54937/