Cyble – Moisha Ransomware In Action 

Cyble Research Labs analyzed a targeted .NET-based ransomware variant named Moisha, linked to the PT_MOISHA team. Moisha uses double-extortion to exfiltrate and encrypt data, while disabling defenses and threatening data leakage if payment isn’t made. #Moisha #PT_MOISHA #CybleResearchLabs

Keypoints

  • Moisha is a 32-bit GUI-based .NET ransomware targeting Windows and was identified in mid-2022, attributed to the PT_MOISHA team.
  • The malware creates a global mutex to ensure only a single instance runs on a host and exits if the mutex already exists.
  • It stops backup, malware-scanner, and other services to prevent interruption during encryption.
  • Moisha terminates selected processes, disables Microsoft Defender real-time protection, and deletes shadow copies to hinder recovery.
  • It enumerates system drives and files, spawns encryption threads, drops a Base64-decoded ransom note, and excludes certain file types from encryption.
  • Encryption uses RSA and AES with a hardcoded RSA public key; the malware spreads laterally via network shares and eventually deletes itself.
  • The ransom note provides contact details (TOX Messenger and ProtonMail) and claims extensive data access within the victim’s network to pressure payment.

MITRE Techniques

  • [T1204] User Execution – The actors use double-extortion to compel payment from victims. “Moisha uses double-extortion techniques to force the victims into paying the ransom.”
  • [T1059] Command and Scripting Interpreter – The malware is a 32-bit GUI-based .NET binary targeting Windows, indicating execution via a compiled binary. “It is a 32-bit GUI-based .NET binary targeting Windows-based operating systems.”
  • [T1027] Obfuscated Files or Information – The ransom note is created by decoding hardcoded Base64 content. “the ransom note by decoding the hardcoded Base64 content.”
  • [T1070] Indicator Removal on Host – It disables Defender real-time protection and deletes shadow copies. “powershell.exe Set-MpPreference -DisableRealtimeMonitoring $true” and “vssadmin.exe delete shadows /all /quiet”.”
  • [T1489] Service Stop – The ransomware stops services such as backups and malware-scanner services to avoid interference. “list of services to Stop.”
  • [T1082] System Information Discovery – It enumerates system drives using System.IO.Directory.GetLogicalDrives().
  • [T1083] File and Directory Discovery – It enumerates files/folders via RecursePath() for encryption. “RecursePath() function to enumerate the files and folders inside the identified system drive.”
  • [T1057] Process Discovery – It checks for a list of processes and kills them if running. “kills them if they are actively running on the victim’s machine.”
  • [T1046] Network Service Discovery – It spreads to other machines in the network using network-related functions. “Network Spreading functions” (EnumNetShares, GetAllShares, etc.).
  • [T1518] Security Software Discovery – It searches for security-related software environments by listing services like backup and malware-scanner services. “a list of services such as backup services, malware-scanner services, and other services.”
  • [T1486] Data Encrypted for Impact – It uses RSA and AES encryption, with a hardcoded RSA public key. “The Moisha ransomware uses the RSA and AES encryption algorithms, and it comes with a fixed hardcoded Base64 encoded RSA Public Key.”
  • [T1490] Inhibit System Recovery – It deletes shadow copies to inhibit recovery. “Delete shadows /quiet” and related steps.

Indicators of Compromise

  • [Hash] Hashes – Moisha Ransomware Executable – d197883d8745a61fe25aebea85622a65, 5d22d359e7b8dc70ccf5e369fb07f2e0960ef76f, and 1 more hash

Read more: https://blog.cyble.com/2022/08/25/moisha-ransomware-in-action/