RA World (formerly RA Group) has shown a notable uptick in activity since March 2024, adopting a multi-extortion model and updating its leak-site presence with a Babuk-based final payload. The article maps RA World’s TTPs, victim sectors (notably U.S. manufacturing and healthcare), geographic reach, and protections offered by Unit 42 and Palo Alto Networks. #RAWorld #RAGROUP #Babuk #BronzeStarLight
Keypoints
- RA World has intensified activity since March 2024, with about 37% of leak-site posts appearing in that period.
- The group uses a multi-extortion scheme, exfiltrating data before encryption and leveraging it publicly if ransoms aren’t paid.
- The operators experimented with a “cost per customer” metric to pressure victims.
- Initially focused on healthcare, RA World shifted mid-2024 toward manufacturing, likely to target higher-paying victims.
- The United States bears the largest impact, followed by parts of Europe and Southeast Asia, with wide geographic reach reported.
- Technical details cover initial access (exploiting internet-facing servers), credential dumping, lateral movement (Impacket, WMI), and a multi-stage Babuk payload for encryption.
- RA World’s leak site evolved to show branding, Donne’s quote, and a “Coming soon” section, signaling ongoing data exfiltration activity.
MITRE Techniques
- [T1190] Exploit Public-Facing Application – Initial Access by exploiting misconfigured or vulnerable internet-facing servers. ‘Based on our telemetry, RA World predominantly exploits misconfigured or vulnerable internet-facing servers. We have not observed instances of phishing attacks to gain initial access to the environment.’
- [T1003] Credential Dumping – Uses PsExec and SysInternals to dump credentials and runs quser/tscon to gather user and session data. ‘They also attempted to run the quser and tscon commands to retrieve data about the current user and remote session.’
- [T1047] Windows Management Instrumentation – Commands executed under the Windows Management Instrumentation Host to move laterally. ‘The attackers executed the above commands under the Windows Management Instrument Provider Host.’
- [T1021.001] Lateral Movement – Impacket used for lateral movement; dumps SAM hive, copies NTDS, and exports the system registry. ‘To move laterally in the compromised network and execute commands on remote endpoints, RA World used the popular Impacket tool. They executed remote commands to dump the SAM hive, copied the NTDS database and exported the system registry.’
- [T1543.003] Create or Modify System Process: Windows Service – Stage2.exe writes itself as a service on the compromised machine. ‘Stage2.exe will write itself as a service to the compromised machine, using the following command: reg add …’
- [T1562.001] Impair Defenses – Safe Mode execution to evade detection. ‘Stage3.exe must be run in safe mode so it can evade detection by security solutions that, by default, won’t run in this mode.’
- [T1560.001] Archive Collected Data – Archiving data (NTDS/SAM/SystemRegistry) during lateral movement with makecab. ‘The commands … makecab [redacted].dit [redacted].zip …’
- [T1486] Data Encrypted for Impact – Final Babuk payload encrypts files; new Babuk variant. ‘Stage3: New Variant of the Babuk Final Payload’ and ‘the final ransomware payload, and a new Babuk variant.’
- [T1041] Exfiltration – The group leaks exfiltrated data via their leak site to coerce payment. ‘RA World maintains a leak site, where the group uploads portions of the stolen data they exfiltrate from their victims to coerce ransom payments.’
- [T1490] Inhibit System Recovery – Attempts to tamper with backups/shadow copies (e.g., vssadmin delete shadows). ‘C:WindowsSystem32cmd.exe /c vssadmin.exe delete shadows /all /quiet’ as shown in Figures highlighting tampering.
Indicators of Compromise
- [File Hashes] Stage 1 – 2a4e83ff1c48baa3d526d51d09782933cec6790d5fa8ccea07633826f378b18a, 57225f38b58564cf7ec1252fbf12475abee58bd6ea9500eb7570c49f8dc6a64c (Stage 1 loader artifacts, plus 3 more hashes)
- [IP Addresses] – 127.0.0.1:8888/Stage2.exe and 192.168.15.13:8080 (URLs shown as loader/test strings in Figure 14)
- [File Names] – Stage1.exe, Stage3.exe (Stage 2 writes a service and other loader/executable artifacts listed in Tables)
Read more: https://unit42.paloaltonetworks.com/ra-world-ransomware-group-updates-tool-set/