Introduction

Babuk, also known as ‘Babuk Locker’, ‘Babyk’ and initially ‘Vasa Locker’, is a ransomware threat utilizing big-game hunter tactics to ‘steal, encrypt and leak’ victim data in an attempt to extort payments of reportedly up to USD 85,000 in Bitcoin (BTC).

As is often the case with threats of this nature, victims are likely determined by the ease at which they can be compromised combined with the likelihood of making payment. As such, Babuk’s leak website states that the group will not target hospitals, non-profit charities or schools as well as avoiding organizations with an annual revenue of less than USD4 million. That being said, private clinics and major universities are considered ‘fair game’ along with charitable foundations ‘who help LGBT and BLM’ causes, the latter likely demonstrating the bigoted views of the threat actor.

Seemingly consistent with the above, identifiable victims thus far include organizations operating in the digital services, engineering and healthcare sectors that have operations in Germany, Hong Kong, Sweden and the United States. Anecdotal data also suggests that malware samples have appeared in other Asian, European and North American countries although this may be as a consequence of increased security researcher activity rather than active compromises.

Whilst not much is known about how the victims were initially compromised, similar ransomware campaigns have previously taken advantage of infrastructure vulnerabilities, such as exploits found in remote desktop protocol (RDP) and virtual private network (VPN) hosts, or utilized stolen credentials to gain initial access.

Based on observations throughout January, Babuk appears to be an actively developed threat, likely set to be further fueled by profits made from their nefarious campaigns.

Demonstrating the active development, the threat actor identity ‘biba99’ posted a message on ‘RaidForums’ (Figure 1), an online forum popular with cybercriminals, suggesting that a ‘*nix’ version is being made available that could target NAS devices and VMware ESXi virtualization hosts alongside the already supported Windows hosts.

Babuk_Cyberint Blog_1

Figure 1 – Babuk Threat Actor Identity ‘biba99’ post on RaidForums (Jan 21, 2021)

Given the steady stream of victims and the active development thus far in 2021, Babuk could easily rise to be yet another infamous and credible targeted ransomware threat to organizations across multiple industries worldwide.

Initial Compromise

Given the nature of this threat, and based on behaviors of other big-game hunter ransomware groups in their targeted attacks, the initial infection vector likely involves the compromise of some account, host or service rather than the ransomware payload being delivered by a broader technique such as an unsolicited malicious email (malspam).

As such, exploitation of vulnerabilities in internet-facing hosts or the compromise of account credentials, potentially following a phishing phase, could allow the threat actors to gain access to the target network.

Once this initial access has been achieved, an element of reconnaissance is almost certainly performed in order to both move laterally within the victim network as well as identifying potential valuable data and hosts.

Subsequently, and prior to the encryption phase, the threat actor is seemingly exfiltrating sensitive data such as documents and financial records related to company confidential matters as well as customer and employee financial and personal data.

The nature of this exfiltration will require forensic analysis of a victim and, as such, no detail has been published or shared thus far. That being said, typical methods could include data transfer to some command and control (C2) infrastructure or even the use of legitimate cloud services.

Having stolen this data, victims that fail to comply with the ransom demands may find that their data is made publicly available (Figure 2) on Babuk’s ‘Leak Site’ (Figure 3) hosted on Tor.

Babuk_Cyberint Blog_2 Babuk_Cyberint Blog_2

Figure 2 – Babuk Leak Site ‘Victim Data Directories’

Babuk_Cyberint Blog_3

Figure 3 – Babuk Leak Site ‘Home Page’

Encryption Process

Notably, based on the ransomware payload samples observed thus far, it appears that each Babuk instance is victim-specific and includes one private encryption key specific to the victim. As such, it is clear that Babuk have tailored their campaigns toward ‘big game’ victims, allowing key generation to be easily managed, rather than indiscriminately targeting individuals.

Presumably after the threat actor has identified a suitable target host and exfiltrated sensitive data from it for use in the extortion phase, the Babuk payload is delivered and can be executed using command line arguments to determine if network shares will be encrypted along with local drives.

Preparation

Upon execution, Babuk follows the typical ransomware process of first attempting to terminate services and processes related to common applications, backup programs, endpoint security solutions and server software (Figures 4 & 5), for reference a list of these is provided in Appendix A.

Babuk_Cyberint Blog_4

Figure 4 – Example Service Termination

Babuk_Cyberint Blog_5

Figure 5 – Example Process Termination

In addition to evading detection during the encryption process and complicating recovery efforts, terminating these processes and services ensures that open files are closed in preparation for being overwritten with encrypted data.

Again, utilizing a common ransomware technique, Windows shadow copies are deleted, in yet another step to thwart recovery, through the execution of the Volume Shadow Copy command line administration utility:

  • "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet

Finally in the preparation stage, the ‘Recycle Bin’ is emptied (Figure 6) presumably to ensure that no data can be recovered from it.

Babuk_Cyberint Blog_6

Figure 6 – Windows ‘Recycle Bin’ Emptied

Encryption Phase

As is to be expected, the ransomware first determines the disk type (fixed, network, optical, RAM or removable) using a list of drive letters before enumerating the available volumes and logical drives (Figure 7) to determine potential sources of data for encryption.

Babuk_Cyberint Blog_7

Figure 7 – Drive and Volume Enumeration

Having obtained the list of potential data locations, a directory traversal process compares each directory and filename against a ‘safe’ list (Figure 8) to ensure that critical system files are not encrypted to allow the victim host to remain operational with internet access.

Babuk_Cyberint Blog_8

Figure 8 – Directory/Filename ‘Safe’ List Comparison

Specifically, directories related to installed applications, the operating system and web browsers are excluded from the encryption process:

  • $Recycle.Bin, All Users, Google, Internet Explorer, Mozilla, Mozilla Firefox, Opera, Opera Software, ProgramData, Program Files (x86), Program Files, Tor Browser, Windows, Windows.old

In addition to the following core files also being excluded from the encryption process:

  • autorun.inf, boot.ini, bootfont.bin, bootmgfw.efi, bootmgr, bootmgr.efi, bootsect.bak, desktop.ini, iconcache.db, ntldr, ntuser.dat, ntuser.dat.log, ntuser.ini, thumbs.db

Once a file candidate for encryption is encountered, Babuk checks to confirm that it has not already been encrypted based on the appended file extension of .__NIST_K571__ (v3) or .babyk (v4). Additionally, any existing ransom note named How To Restore Your Files.txt is also skipped.

Subsequently, assuming the file is to be encrypted, the Babuk file extension is appended and the file is opened ready to be overwritten with encrypted data (Figure 9).

Babuk_Cyberint Blog_9

Figure 9 – Babuk File Extension Append & Preparation

To ensure that the file can be overwritten without encountering errors due to it being in use by another process, and in addition to the earlier process and service termination, the Windows Restart Manager appears to be utilized (Figure 10).

Babuk_Cyberint Blog_10

Figure 10 – Observed Windows Restart Manager Function Calls

The Windows Restart Manager was initially introduced to eliminate or reduce the number of restarts required during legitimate installations or updates and has seemingly been adopted by some ransomware threats for nefarious purposes. Specifically, the Restart Manager performs the following steps that provide obvious benefits to a malicious file manipulation process:

  • RmStartSession – Starts the Restart Manager session;
  • RmRegisterResources – Registers resources, in this case the targeted filename;
  • RmGetList – Determine which processes or services are using the registered resource (file);
  • RmShutdown – Shuts down any identified process or service using the registered resource;
  • RmRestart – Restarts any identified process or service after the file modification;
  • RmEndSession – Closes the Restart Manager session.

Utilizing the ChaCha8 stream cipher for encryption and Elliptic-curve Diffie-Hellman (ECDH) for key generation (Figure 11), the targeted file is encrypted and, in the absence of gaining access to the private key or paying the ransom to receive the decryption utility, decryption will likely be incredibly difficult.

Babuk_Cyberint Blog_11

Figure 11 – Babuk ‘About’ Page

For reference, those interested in an expanded explanation of the Babuk encryption routine are encouraged to read the personal blog article authored by Chuong Dong [1], an independent security researcher, which details key generation, a ‘mediocre’ multithreading approach and the approach to files larger than 41MB which are reportedly split into three regions with only the first 10MB being encrypted.

Further complicating decryption efforts, Babuk v3 was reportedly observed in January 2021 as implementing a faulty public key generation routine that would prevent even the threat actor from successfully recovering data. This issue was since resolved in version 4, along with other subtle changes including the introduction of the .babyk file extension and a new mutual exclusion object (mutex) abusing the security researcher Choung Dong.

Once files within a directory have been encrypted, a text file named How To Restore Your Files.txt is created (Figure 12) and contains the ransom note that is displayed at the conclusion of the ransomware process.

Babuk_Cyberint Blog_12

Figure 12 – Ransom Note Creation

Finally, the encryption key utilized by Babuk is saved to %appdata%\ecdh_pub_k.bin and will be required by the victim should they contact the threat actor to pay the ransom and obtain the decryption utility.

Extortion

Victims infected by Babuk will, on conclusion of the encryption phase, be presented with a text file containing the ransom note (Appendix B) that instructs them to contact the threat actor via a Tor hidden service (Figure 13) using a link that includes a unique victim identifier.

Babuk_Cyberint Blog_13

Figure 13 – Babuk Contact Site (Tor Hidden Service)

Based on observed interactions with previous victims, the threat actor may first seek to determine if the contact is a ‘recovery company’ and if the victim has ransomware insurance, likely in an attempt to extort a higher ransom payment if either of these is the case.

The victim, having responded to these initial questions, will likely then be prompted to share 4-5 encrypted files, of no more than 10MB in size, along with the corresponding %appdata%\ecdh_pub_k.bin file from an infected host. The threat actor will then decrypted these files as proof of their capabilities and presumably seek payment to decrypt the remaining data.

Those failing to contact the threat actor, or meet their demands, will likely in the first instance find themselves ‘named and shamed’ on the threat actor’s leak site along with a deadline for compliance.

Failure to meet the threat actor’s demands at this stage will, based on what has been observed thus far, result in the stolen data being leaked via this Tor hidden service.

As is to be expected in ransomware attacks of this nature, the threat actor requests that payment is made using Bitcoin and provides basic instructions for the use of their decryption utility (Figure 14).

Babuk_Cyberint Blog_14

Figure 14 – Babuk Payment Terms and Decryption Utility Instructions

Recommendations

  • Business continuity and disaster recovery planning remain an important consideration when it comes to being prepared for ransomware worst-case scenarios.
  • Ransomware threats of this nature often exploit known vulnerabilities, as such, robust patch management procedures should be enforced to ensure exposed infrastructure is secured.
  • Employee security awareness training can help end-users identify suspicious communications and stop many common attack vectors.
  • Practice least privilege to limit the impact of credential compromise and contain threats through segregation and limited access.
  • Continuous monitoring of endpoint security events, and unusual behaviors such as excessive file operations, can provide an early indication of compromise.
  • Given the data theft element of these ransomware campaigns, data sensitive data should be adequately secure, such as through the use of encryption or additional controls in accordance with any legal or regulatory requirements.
  •  Application permit and deny lists can detect and prevent the execution of unauthorized or unknown executables to harden operating systems against attack.
  • Limiting access to administrative and system management tools, such as those abused by ransomware threats, can prevent misuse by threat actors.
  • Network segregation, creating separate logical segments for assets that share a similar risk profile and limiting communications between them allows attacks to be contained and provides another layer of damage limitation.
  • Wherever possible, organizations should seek to remediate a ransomware attack rather than making ransom payments which serve only to perpetuate the problem and fund threat developments.
  • Consideration should be given to the use of an isolation approach, such as provided by Microsoft Defender Application Guard [2], to help protect users from untrusted Office documents and when browsing untrusted websites.

Indicators of Compromise

Whilst it Babuk payloads will likely differ between victims, the following observed indicators of compromise (IOC) may prove useful to defenders further investigating this threat.

URLs

  • Contact site: hxxp://babukq4e2p4wu4iq.onion/login.php?id=<VICTIM_IDENTIFIER>
  • Leak site: hxxp://gtmx56k4hutn3ikv.onion

File Hashes (SHA256)

Version 4

  • ef326291febe84d6b39d2e5cea7e99a02407892729d688c27dcc444a2ae0b544
  • 3dda3ee9164d6815a18a2c23651a53c35d52e3a5ad375001ec824cf532c202e6

Version 3

  • 1b9412ca5e9deb29aeaa37be05ae8d0a8a636c12fdff8c17032aa017f6075c02
  • 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8
  • 550771bbf8a3e5625d6ec76d70ed86f6e443f07ce80ff73e47f8249ddd72a8cf
  • 8140004ff3cf4923c928708505754497e48d26d822a95d63bd2ed54e14f19766
  • 704a0fa7de19564bc743fb68aa0652e38bf86e8ab694bc079b15f945c85f4320
  • 8203c2f00ecd3ae960cb3247a7d7bfb35e55c38939607c85dbdb5c92f0495fa9
  • afcf265a1dcd9eab5aab270d48aa561e4ddeb71c05e32c857d3b809bb64c0430
  • c5167053129bd4a5542cfef9e739b0443e22e184cb4c0b57c049b448f030cf15

Mutex

  • babuk_v3
  • DoYouWantToHaveSexWithCoungDong

Encrypted File Extensions

  • .__NIST_K571__
  • .babyk

Dropped Files

  • How To Restore Your Files.txt
  • %appdata%\ecdh_pub_k.bin
  • DECR.TXT (Early ‘Vasa Locker’ version)

MITRE ATT&CK

Technique Tactic
T1001 – Data Obfuscation Command & Control
T1005 – Data from Local System Collection
T1007 – System Service Discovery Discovery
T1012 – Query Registry Discovery
T1018 – Remote System Discovery Discovery
T1036 – Masquerading Defense Evasion
T1055 – Process Injection Defense Evasion, Privilege Escalation
T1055.012 – Process Injection: Process Hollowing Defense Evasion, Privilege Escalation
T1057 – Process Discovery Discovery
T1067 – Bootkit Persistence
T1070.004 – File Deletion Defense Evasion
T1081 – Credentials in Files Credential Access
T1082 – System Information Discovery Discovery
T1083 – File and Directory Discovery Discovery
T1090 – Proxy Command & Control
T1091 – Replication Through Removable Media Initial Access, Lateral Movement
T1105 – Ingress Tool Transfer Command & Control
T1107 – File Deletion Defense Evasion
T1119 – Automated Collection Collection
T1120 – Peripheral Device Discovery Discovery
T1135 – Network Share Discovery Discovery
T1143 – Hidden Window Defense Evasion
T1486 – Data Encrypted for Impact Impact
T1490 – Inhibit System Recovery Impact
T1497 – Virtualization/Sandbox Evasion Defense Evasion, Discovery
T1518.001 – Security Software Discovery Discovery
T1547.001 – Registry Run Keys / Startup Folder Persistence, Privilege Escalation

Appendix A – Process/Service Termination

Processes and services associated with the following application, data backup and endpoint security names are terminated by Babuk during its execution along with any service containing the string svc$:

Applications

  • Intuit QuickBooks: Intuit.QuickBooks.FCS, QBCFMonitorService, QBFCService, QBIDPService
  • Microsoft Office: excel.exe, infopath.exe, msaccess.exe, mspub.exe, onenote.exe, outlook.exe, powerpnt.exe, visio.exe, winword.exe
  • Microsoft Windows: notepad.exe, wordpad.exe
  • Mozilla Firefox: firefox.exe
  • Mozilla Thunderbird: tbirdconfig.exe, thunderbird.exe
  • Ritlabs The Bat!: thebat.exe
  • Valve Steam: steam.exe

Backup Software

  • Acronis: AcronisAgent, AcrSch2Svc
  • Arcserve: CAARCUpdateSvc,CASAD2DWebSvc
  • Commvault: GxBlr, GxCIMgr, GxCVD, GxFWD, GxVss
  • IBM vSnap: VSNAP
  • Microsoft Volume Shadow Copy Service: vss, VSSProvider
  • Redgate SQL Backup: sqbcoreservice.exe
  • STC Raw Backup Agent: stc_raw_agent
  • Veeam: veeam, VeeamDeploymentService, VeeamNFSSvc, VeeamTransportSvc
  • Veritas: BackupExecAgentAccelerator, BackupExecAgentBrowser, BackupExecDiveciMediaService, BackupExecJobEngine, BackupExecManagementService, BackupExecRPCService, BackupExecVSSProvider, PDVFSService
  • YooBackup: YooBackup, YooIT

Endpoint Security

  • 360 Safe Guard: zhudongfangyu
  • Norton/Symantec Antivirus: ccEvtMgr, ccSetMgr, DefWatch, RTVscan, SavRoam
  • Panda Security (or NTI BackUp): agntsvc.exe
  • Sophos: sophos

Servers

  • Citrix MetaFrame: encsvc.exe
  • MailEnable: memtas, mepocs
  • Microsoft SQL Server: sqlsvc, sql.exe
  • Oracle: isqlplussvc.exe, mydesktopqos.exe, mydesktopservice.exe, ocautoupds.exe, ocomm.exe, oracle.exe, ocssd.exe, dbsnmp.exe, synctime.exe, xfssvccon.exe
  • Sybase SQL Anywhere: dbeng50.exe


Appendix B – Ransom Note Examples

Version 3

———– [ Hello, <VICTIM_ORGANIZATION> ] ————->

****BY BABUK LOCKER****

What happend?
———————————————-
Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data.
But you can restore everything by purchasing a special program from us – a universal decoder. This program will restore your entire network.
Follow our instructions below and you will recover all your data.
If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web.

What guarantees?
———————————————-
We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests.
All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems.
We guarantee to decrypt one file for free. Go to the site and contact us.

What information compromised?
———————————————-
We copied more than <STOLEN_DATA_VOLUME> from your internal network, here are some proofs, for additional confirmations, please chat with us
In cases of ignoring us, the information will be released to the public.
<IMGUR_IMAGE_LINKS>

How to contact us?
———————————————-
Using TOR Browser ( hxxps://www.torproject.org/download/ ):
hxxp://babukq4e2p4wu4iq.onion/login.php?id=<VICTIM_IDENTIFIER>

!!! DANGER !!!
DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them.
!!! DANGER !!

Version 4

## [ babyk ransomware ] ##

* What happend?
———————————————-
Your computers and servers are encrypted, backups are deleted from your network and copied.
We use strong encryption algorithms, so you cannot decrypt your data without us.
But you can restore everything by purchasing a special program from us – a universal decoder.
This program will restore your entire network. Follow our instructions below and you will recover all your data.
If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting
your data to the dark web.

* What guarantees?
———————————————-
We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests.
All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems.
We guarantee to decrypt one file for free. Go to the site and contact us.

* What information compromised?
———————————————-
We copied many data from your internal network,
here are some proofs (private link): http://gtmx56k4hutn3ikv.onion/?<VICTIM_IDENTIFIER>

For additional confirmations, please chat with us/
In cases of ignoring us, the information will be released to the public in blog http://gtmx56k4hutn3ikv.onion/

* How to contact us?
———————————————-
1) Download for browser: https://www.torproject.org/download/
2) Open it
3) Follow this link in tor browser: http://babukq4e2p4wu4iq.onion/login.php?id=<VICTIM_IDENTIFIER>

References

[1] http://chuongdong.com/reverse engineering/2021/01/03/BabukRansomware/

[2] https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start