Cyble – Unveiling Wagner Group’s Cyber-Recruitment

Cyble researchers analyzed a Chaos ransomware variant dubbed Wagner, whose ransom note urges victims to join the Wagner Group rather than pay. The report links the Russian-language sample and Wagner messaging to potential attribution while detailing Wagner’s encryption, persistence, and propagation techniques. #WagnerGroup #ChaosRansomware #Shoigu #PMCWagner

Keypoints

  • Wagner is described as a variant of Chaos ransomware with messaging aligned to the Wagner Group.
  • The ransom note calls for joining the Wagner PMC and includes political/defamatory content against Russian defense leadership.

MITRE Techniques

  • [T1204] User Execution – The ransomware, upon execution, initializes different variables that specify its execution. ‘The ransomware, upon execution, initializes different variables that specify its execution.’
  • [T1547] Registry Run Keys / Startup Folder – To ensure persistence, it will make a copy of itself as “svchost.exe” in the startup folder. ‘to ensure persistence, it will make a copy of itself as “svchost.exe” in the startup folder.’
  • [T1082] System Information Discovery – The ransomware retrieves all drive types using the DriveInfo.GetDrives() method. ‘The ransomware retrieves all drive types using the DriveInfo.GetDrives() method.’
  • [T1083] File and Directory Discovery – The following directories are targeted by ransomware in the “C” drive. ‘The following directories are targeted by ransomware in the “C” drive.’
  • [T1057] Process Discovery – By retrieving a list of all running processes using the GetProcesses() method and then searches for a process with the same name as the current process. If it discovers such a process, it terminates itself to prevent multiple instances from running simultaneously. ‘by retrieving a list of all running processes using the GetProcesses() method and then searches for a process with the same name…’
  • [T1486] Data Encrypted for Impact – The AES algorithm to encrypt files; a random key per file; the AES key is encrypted with RSA and stored in the file. ‘The AES algorithm to encrypt files… encrypts the AES encryption key using the RSA algorithm.’
  • [T1490] Inhibit System Recovery – Commands to delete shadow copies, modify boot status policy, and disable recovery. ‘vssadmin delete shadows /all /quiet & wmic shadowcopy delete’ and ‘bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no’ and ‘wbadmin delete catalog -quiet’

Indicators of Compromise

  • [Hash] Wagner Ransomware binary – d26b2c8fc07cb5c72bfc40779f09d491
  • [Hash] Wagner Ransomware binary – 8ee7fc0171b980aa93b687e334d1e29a8d634085
  • [Hash] Wagner Ransomware binary – 1238ab3dd3ed620536969ee438e99a33a418ba20f5e691962ed07904e075b2a4

Read more: https://blog.cyble.com/2023/06/27/unveiling-wagner-groups-cyber-recruitment/