In October, Sophos researchers have spotted the Memento ransomware that adopts a curious approach to block access to victims’ files. The ransomware copies files into password-protected WinRAR archives, it uses a renamed freeware version of the legitimate file utility WinRAR. The Memento ransomware then encrypts the password and deletes the original files from the victim’s system.
The group initially attempted to encrypt files directly, but its was blocked by defense solutions. Then it changed tactics, using the above process and demanding $1 million to restore the files. The gang also allows the recovery of single files for 0.099 BTC (5036,21 EURO).
Like other groups, the Memento Team threatens data leakage if the victim did not pay the ransom.
The Pyton ransomware is compiled with the PyInstaller, once blocked access to the files it drops a ransom note that instructs the victims to contact the gang via Telegram. Sophos also noticed that the threat actors also deployed an open-source Python-based keylogger on several machines and made later movements within the network using Remote Desktop Protocol and SSH.
The gang was observed exploiting the CVE-2021-21972 vulnerability in VMware vCenter Server for the initial access to target networks.
vCenter Server is the centralized management utility for VMware, and is used to manage virtual machines, multiple ESXi hosts, and all dependent components from a single centralized location.
The flaw could be exploited by remote, unauthenticated attackers without user interaction.
“The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.” reads the advisory published. “A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. “
The issue affects vCenter Server plugin for vROPs which is available in all default installations. vROPs does not need be present to have this endpoint available. The virtualization giant has provided workarounds to disable it.
Below is the attack chain used by the Memento gang:
Once gained access to the target network, the intruders first attempted to expand their reach using RDP, then after a couple of weeks began to use WinRAR to compress a collection of files for exfiltration. The ransomware operators move the archives to a directory on a shared drive they could access via RDP before deleting any files using Jetico’s BCWipe data wiping utility.
“The modifications to the ransomware changed its behavior to avoid detection of encryption activity. Instead of encrypting files, the “crypt” code now put the files in unencrypted form into archive files, using the copy of WinRAR, saving each file in its own archive with a .vaultz file extension. Passwords were generated for each file as it was archived. Then the passwords themselves were encrypted.” reads the analysis published by Sophos. “These variants were built and executed hours after the first attempt. The malware was spread manually by the attackers, using RDP and stolen credentials.”
Sophos states that in the attacks that it has investigated, victims did not pay the ransom because used their backups to restore the files.
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, Memento ransomware)