DJVU: The Ransomware That Seems Strangely Familiar…

DJVU ransomware masquerades as legitimate software or decoy files and often partners with other threats to download information stealers for data exfiltration. It evolved from STOP ransomware, adding obfuscation and a highly flexible infection chain that includes GeoIP checks, privilege escalation, and encryption. #DJVU #RedLine

Keypoints

  • DJVU is a variant of STOP ransomware that now sometimes deploys information stealers (e.g., Vidar/Redline) through partnerships to enhance data theft.
  • Infection vectors are flexible and often rely on masquerading as legitimate downloads, cracked software, or decoy files on file-hosting/torrent sites.
  • The malware uses multiple obfuscation layers, including TEA-based shellcode and XOR, plus process hollowing to inject the payload into another process.
  • A GeoIP lookup determines victim location; if the country matches CIS nations, the payload does not execute.
  • Persistence and privilege escalation are achieved via a randomly generated AppDataLocal folder, icacls protections, a Run registry key, admin elevation, and a scheduled task.
  • DJVU communicates with a C2 using a MAC address-derived MD5 hash (offline/online IDs), stores responses in local files, and may drop additional malware from external domains.

MITRE Techniques

  • [T1027] Obfuscated/Compressed Files and Information – DJVU begins its execution chain with several layers of obfuscation meant to slow down analysis… “The first shellcode stage is encrypted using the Tiny Encryption Algorithm (TEA).”
  • [T1055] Process Injection – “The second stage of shellcode then starts a new process using the same binary. It uses process hollowing to inject the unobfuscated copy of the malware into the new process.”
  • [T1082] System Information Discovery – “The threat’s malicious activity begins in earnest by finding out where the victim’s device is located. It does this by checking the device location via a GeoIP lookup service at the following URL: ‘hxxps[:]//api[.]2ip[.]ua/geo[.]json’.”
  • [T1053.005] Scheduled Task – “The malware creates persistence via a scheduled task using the ITaskService interface of the TaskScheduler COM object.”
  • [T1112] Modify Registry – “The malware creates persistence via a registry Run key called ‘SysHelper’ in the following registry path: ‘HKEY_Current_UserSoftwareMicrosoftWindowsCurrentVersionRun’.”
  • [T1548.001] Abuse Elevation: UAC – “ShellExecute APIs with the ‘runas’ verb to attempt to start itself again with Admin privileges. Depending on the victim’s device settings, this might display a User Account Control (UAC) dialog box…”
  • [T1071.001] Web Protocols – “The payload then runs in an elevated state, with the arguments… The malware then uses a MAC address MD5 to connect to a malicious command-and-control (C2) using the following URL: hxxps[:]//acacaca[.]org/d/test1/get.php?pid={MAC Address_MD5}&first=true”

Indicators of Compromise

  • [URL] Malicious URLs – hxxp://116.202.180.202/8069076584.zip, hxxp://acacaca.org/test1/get.php?pid=53B1E5DA52C0B1B73B57A5129A43BC5D&first=true
  • [Domain] Domains – acacaca.org, rgyui.top
  • [IP Address] IP addresses – 116.202.180.202
  • [Email] Email Addresses – Support[at]bestyourmail[.]ch, Datarestorehelp[at]airmail[.]cc
  • [PDB Path] PDB Paths – e:docmy work (c++)_gitencryptionreleaseencrypt_win_api.pdb, C:renobi11_senuxisecituxacoxuzeflayesarelimefuzazokusuf.pdb
  • [SHA256] Hashes – db41e055496b7eb3dfed7bc50a2afe8636c742a1d0963489569134d9e95aa1fc, 5fc8f1eddeb98d127899c15663275da4a30b734e0c812ea4ca24fc99023329da, and 1 more hash
  • [Mutex] Mutexes – {1D6FC66E–D1F3–422C–8A53–C0BBCF3D900D}, {FBB4BCC6–05C7–4ADD–B67B–A98A697323C1}
  • [File Name] File Names – readme.txt, Bowsakkdestx.txt
  • [File Extension] Excluded Extensions – .sys, .ini, and other N items

Read more: https://blogs.blackberry.com/en/2022/09/djvu-the-ransomware-that-seems-strangely-familiar