The cyber threat team at retail giant Walmart has analyzed a new ransomware family dubbed Sugar, which is offered through a ransomware-as-a-service (RaaS) model.
Unlike other ransomware operations, Sugar ransomware appears to primarily focus on individual computers instead of entire enterprises. The Sugar malware was first discovered in the wild in November 2021, it is a Delphi malware that borrows code from other ransomware families.
One of the most interesting components of the new malware family is the crypter that uses a modified version of RC4 algorithm and the reuse of the same routine from the crypter as part of the string decoding in the malware.
This suggests that the Sugar ransomware and its crypter were developed by the same team, another scenario sees the crypter that is being offered by a threat actor to a network of affiliates.
“The malware is written in Delphi but the interesting part from a RE perspective was the reuse of the same routine from the crypter as part of the string decoding in the malware, this would lead us to believe that they have the same dev and the crypter is probably part of the build process or some service the main actor offers to their affiliates.” reads the analysis published by Walmart.
The experts also noticed some similarities between the ransomware of Sugar and the REvil‘s one, while the decryptor page is similar to the one used by Clop operators.
Other similarities were found by the experts in the GPLib library used for encryption/decryption operations.
The researchers also published Indicators of Compromise (IoCs) for this threat.
Follow me on Twitter: @securityaffairs and Facebook
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, ransomware)