Cyble – Demystifying Money Message Ransomware 

Money Message is a newly found ransomware family that can encrypt network shares on Windows and Linux, using admin credentials embedded in its config to access network resources. It employs double extortion by exfiltrating data before encryption and publishing it on a leak site if the ransom isn’t paid.
#MoneyMessage #Maze

Keypoints

  • New ransomware family named Money Message can encrypt both local drives and network shares on Windows and Linux.
  • The group appears to leverage credentials stored in the binary’s configuration to reach and encrypt network resources.
  • Double extortion: data is exfiltrated before encryption and may be published on a leak site if the ransom is unpaid.
  • First observed in March 2023 with victims across multiple industries (BFSI, Transportation/Logistics, Professional Services) and several high-profile U.S. targets.
  • The malware’s configuration is appended to the binary’s end (offset 0xBF000) and includes parameters such as mutex_name, network keys, and processes_to_kill.

MITRE Techniques

  • [T1007] System Service Discovery – The ransomware enumerates system services and their status, then stops those listed in the configuration. “EnumServicesStatusExW() function to enumerate all the services and their status. If any of the services present in the configuration are found to be running, the ransomware stops them using CloseServiceHandle.”
  • [T1083] File and Directory Discovery – It scans drives to determine what to encrypt, including driving letter enumeration and type identification. “Now it scans all the available drive letters on the system, starting from A to Z. It uses the GetDriveTypeW() function to identify the type of drive connected to each letter.”
  • [T1135] Network Share Discovery – It targets network shares as part of its lateral movement/lateral access approach. “The Money Message ransomware tries to access administrative network shares by calling WNetAddConnection2W() with admin authentication credentials present in the configuration.”
  • [T1021] Remote Services – Uses network-maintained credentials to access and encrypt resources over the network. “Once it has gained access to the network using these credentials, the ransomware begins encrypting files in the network shares.”
  • [T1057] Process Discovery – Captures and iterates over actively running processes to determine targets to terminate. “The ransomware captures a list of the actively running processes on the victim’s machine by utilizing the CreateToolhelp32Snapshot() function, and then iterates through each process using the Process32FirstW() and Process32NextW() functions.”
  • [T1105] Inhibit System Recovery / [T1490] Inhibit System Recovery – Deletes shadow copies to hinder recovery. “uses ShellExecuteW() function to execute the “vssadmin.exe delete shadows /all /quiet” command, which deletes all Volume Shadow Copy Service (VSS) snapshots on the system without prompting for confirmation.”
  • [T1140] Deobfuscate/Decode Files or Information – Handles encoded ransom note and decoding steps. “The ransomware fetches the base64 encoded ransom note from the configuration and then decodes it.”
  • [T1562] Impair Defences – Stops security-related services to weaken defenses. “The ransomware stops the following services: vss, memtas, Veeam, sql, …”
  • [T1486] Data Encrypted for Impact – Encrypts data using strong crypto (ECDH for key exchange and ChaCha cipher). “It uses the Elliptic Curve Diffie-Hellman (ECDH) key exchange and ChaCha stream cipher algorithm to encrypt data.”
  • [T1021.002] SMB/Windows Admin Shares – Lateral movement into network shares via Windows admin shares using credentials from config. “Money Message ransomware tries to access administrative network shares by calling WNetAddConnection2W with admin authentication credentials present in the configuration.”

Indicators of Compromise

  • [MD5] Money Message Windows Executable – 400fa5d02c1ac704cd290d959b725e67, abe3c3cc45dec9c01762ba3e534564ed
  • [SHA1] Money Message Windows Executable – 456e5cb1739cb5f29020d1a692289a5af07ce90d, 3b4ecff980285461642cc4aef60d4a1b9708453e
  • [SHA256] Money Message Windows Executable – dc563953f845fb88c6375b3e9311ebed49ce4bcd613f7044989304c8de384dac, 4f8bd37851b772ee91ba54b8fd48304a6520d49ea4a81d751570ea67ef0a9904

Read more: https://blog.cyble.com/2023/04/06/demystifying-money-message-ransomware/