Ransomhub Ransomware: Double-Extortion Attack and How to Defend

defence

Cyberattacks are constantly evolving, and ransomware remains a critical threat. We recently encountered the RansomHub ransomware group, which leverages double-extortion tactics against businesses and critical infrastructure. In this blog post, we share key insights and Indicators of Compromise (IoCs) to help you defend against RansomHub’s latest attacks.

A cybersecurity-themed image featuring an encrypted digital environment.

Attack Overview

The threat actor targeted a Cisco ASA firewall and compromised VPN users. Successfully compromised users were used to move laterally to servers, targeting especially file-servers. Data was (rather hastily) collected and exfiltrated through sFTP with FileZilla to a Russian IP-address. Then ransomware was rolled out via SMB with a compromised domain administrator. The attackers used PSExec to connect via SMB and services.exe to implement a service starting the ransomware.

Threat Actor

Ransomhub is a ransomware group utilizing the double-extortion model - exfiltrating data threatening to publish it as well as encryption of the data on-site. According to CISA  and Watchguard, the threat actor appears to be active since February 2024 and focuses on critical infrastructure. Since their first appearance they listed more than 500 organizations on their leak page.

Defences

When a threat actor is detected in a network, a cat and mouse game begins, where the defenders attempt to increase the cost for an attacker. The goal is to either drive the attacker out of the systems, or to force them into giving up on their objectives due to the high costs. In this case the threat actor was unable to persist as an Endpoint Detection and Response (EDR) tool was rolled out within hours to increase visibility and isolate the threat. Through coordinated partial isolations of non-critical systems and compromised users we successfully locked the threat actor out of the network while keeping critical services online. Credential rotation proofed to be an effective defensive measure. In parallel we increased the overall visibility in the network and brought in further security measures and tools for deeper threat hunting on scale.

The threat actor was able to use some anti-forensics techniques with the ransomware deployment, affecting Windows Event Logs in particular. Other logs were unaffected based on our investigation.

The attacker used of the land techniques, utilizing Remote Access Solutions such as Atera and Splashtop. Blocklisting these two applications in combination with credentials rotation prevented further logins from the threat actor.

Indicators of Compromise (IOCs)

The following lists show the Indicators of Compromise (IOCs), i.e. artifacts the attacker(s) left on compromised machines.

Host-Based IOCs

TypeIOCHashDescriptionSeverity (0-10; 0 = less severe; 10 = very severe)
Filepath

C:\Windows\TEMP\

ateraAgentSetup64_1_8_7_2.msi

-Abused legitimate software: Atera1
Filename123.bat-Script which deletes all log-files via wevutil.exe5
Filenameamd64.exeSHA-256: 101B975A940991E82085F9CC763532BE3B234B6BAB97ACFED8331F4FF0494216
SHA-1: 4cde493288c142daa6e377c2ab0ace750cedcfe8
MD5: C193CBFBE78F2119398A888C0148ECF2
Imphash: F0EA7B7844BBC5BFA9BB32EFDCEA957C
Ransomware (installer)10
Filename-patternC:\[a-zA-Z]{6}.exe-

Regex-path to the distributed ransomware (with random 6-character name). Gets created via C:\Windows\system32\services.exe

Commandline execution: C:\[a-zA-Z]{6}.exe -only-local -pass [a-z0-9]{64} 

10
FilepathC:\windows\amd64.exe

SHA-256: 101B975A940991E82085F9CC763532BE3B234B6BAB97ACFED8331F4FF0494216

SHA-1: 4cde493288c142daa6e377c2ab0ace750cedcfe8

MD5: C193CBFBE78F2119398A888C0148ECF2

Imphash: F0EA7B7844BBC5BFA9BB32EFDCEA957C

 

Commands executed to start the ransomware: amd64.exe -pass [a-z0-9][64] powershell.exe -Command PowerShell -Command "{ Get-VM | Stop-VM -Force }" cmd.exe /c iisreset.exe /stop powershell.exe -Command PowerShell -Command "\"Get-CimInstance Win32_ShadowCopy | Remove-CimInstance\"" cmd.exe /c wevtutil cl security cmd.exe /c wevtutil cl system cmd.exe /c wevtutil cl application 10
FilenameAteraAgent.exeSHA-256: a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2
SHA-1: e9aa4e6c514ee951665a7cd6f0b4a4c49146241d
MD5: 477293f80461713d51a98a24023d45e8
Abused legitimate software: Atera1
FilepathC:\Audit\Active Directory\ntds.dit-Dump location of Active Directory passwords7
FilepathC:\Audit\registry\SECURITY-Dump location of Security Registry5
FilepathC:\Audit\registry\SYSTEM-Dump location of System Registry5
FilepathC:\temp\tftpd64.464\tftpd64.exeSHA-256: 34de53b43c32e3ed5231a57683103acad1aebeef08309cf8e770c27acc90e4e7
SHA-1: ea34a6bad04bc5a1fcb494668347cd302557f327
MD5: 3c1e3215acc69f06f044802ed4695333

Abused legitimate software

(T)FTP-client from https://pjo2.github.io/tftpd64/

1
FilepathC:\Users\[Username]\Downloads\amd64.exe-Alternative path for ransomware10
FilepathC:\Users\[Username]\Downloads\net82\SoftPerfectNetworkScannerPortable.exe-Abused legitimate software: NetworkScanner1
FilepathC:\Users\[Username]\Downloads\netscan.exe-Abused legitimate software: Netscan1
FilenameDef.bat-

Batch script to disable Anti-Virus.

Content:

powershell Add-MpPreference -ExclusionPath C:\ powershell Set-MpPreference -DisableRealtimeMonitoring $true 

9
FilenameDefeat-Defender2.bat-

Batch script to disable Anti-Virus.

Content:

powershell -nop -win 1 -c iex ([io.file]::ReadAllText($env:0)) 

9
FilenameFileZilla_3.67.1_win64_sponsored2-setup.exe-Abused legitimate software: FileZilla1
Filenamelsass.DMP-Filename of LSASS dump (likely through mimikatz)7
Filenamelsass.zip-Filename of LSASS dump (likely through mimikatz)7
Filenamemimikatz.exeSHA-256: 61C0810A23580CF492A6BA4F7654566108331E7A4134C968C2D6A05261B2D8A1
SHA-1: e3b6ea8c46fa831cec6f235a5cf48b38a4ae8d69
MD5: 29efd64dd3c7fe1e2b022b7ad73a1ba5
Used attacker tool: Mimikatz10
FilepathC:\Users\[Username]\Downloads\PsExec.exe-Abused legitimate software: PsExec1
FilepathC:\Windows\PSEXESVC.exe-Abused legitimate software: PsExec1
FilenameSRAgent.exeSHA-256: 2f7dcf7256d091c3ef9c68b63c6f2e87d5dbc0131aca402cf0f6052a8df610b0
SHA-1: 7d3481e4318c08c626ad22c25ca2a3a587343fe8
MD5: bc978e6240296fc134feac2360f5b688
Abused legitimate software: Splashtop 1
Filename-patternREADME_[a-z0-9]{6}.txt-

RansomHub Ransomnote

(some systems included the ransomnote even though the encryption failed)

7

Table 2: Host-based Indicators of Compromise of RansomHub

Network-based IOCs

TypeIOCDescriptionSeverity (0-10; 0 = less severe; 10 = very severe)
HostnameDESKTOP-HB93HTQhostname of the attacker7
IP83.97.73.198Russian IP used for exfiltration with FileZilla, see https://whois.domaintools.com/83.97.73.19810
IP152.67.73.250Connection via Splashtop (US; Oracle Public Cloud)5
IP172.202.80.17Connection of AteraWatchdog (US; Microsoft)2
IP18.66.112.49Connection via AteraAgent (Germany; Amazon)5
IP35.157.63.227Connection of AteraWatchdog (Germany; Amazon)2
IP35.157.63.228Connection of AteraWatchdog (Germany; Amazon)2
IP35.157.63.229Connection of AteraWatchdog (Germany; Amazon)2
IP89.168.24.63Connection via Splashtop (UK; Oracle)5

Table 3: Network-based Indicators of Compromise of RansomHub

The analysis of this ransomware case was a team-effort. Special thanks goes to Frieder Uhlig, Barbara Obermair, Michael Popovtschak, Chris Golitschek, Dominik Augustin, Ivan Boranijasevic, Lukas Gartner, Marek Jablonski, Volkan Teterra and Dr. Michael Denzel.