Thursday, February 6, 2025
HomeRansomwareCyber Criminals Launch Hermes Ransomware Via Password Protected Word Documents

Cyber Criminals Launch Hermes Ransomware Via Password Protected Word Documents

Published on

SIEM as a Service

Follow Us on Google News

Cyber Criminals distributing Hermes Ransomware via dangerous malspam that contains Weaponized Password protected Word documents to encrypt the system files and lock the victim’s computer.

Hermes Ransomware Attack is wide spreading Ransomware nowadays with newly updated futures under constant development to target various countries.

Few Months Before attackers distributed Hermes ransomware through the flash exploit and attacks targetted on South Korean users.

Malware authors added many futures in newly evolved versions Ransomware such as change the method to get the Trojan key, algorithm, crypto-libraries and distribution method.

Also, they are using various obfuscation techniques to evade the detection of anti-virus software and maintain its persistance.

Currently discovered malicious word document protected with a password that shows a 1 / 59 detection rate in VirusTotal.

How does Hermes Ransomware Infection Works

Intially Hermes Ransomware distributed via malspam that claimes the job applications with malicious attached word documents.

Once user trying to open the documents, it keeps requesting the password to open the file and the password has mentioned within the mail body content with sending addresses ending in anjanabro.com.

After opening the document, a user asked to enable the macros with a security warning to proceed the malicious document to do further malicious activities.

According to SANS, After successfully opening the attached Word document and enabling macros, I only saw one HTTP request that returned a malware binary. This was Hermes ransomware, and it didn’t generate any post-infection traffic.

After completing the infection process, vicitms disk files will be completely encrypted and the ransom notes will be displayed on a desktop.

Ransom note indicates that the victim’s files are encrypted using  RSA2048 algorithm with a unique public key and the user asked to pay the ransom amount in bitcoin.

Also, infected users can test 1 file as a token decryption key and attacker provide a contact email decryptsupport@protonmail.com for further instructions.

Indicators for this infection

SHA256 hash: 4e5f6a6e8c073828af55c830fad5ce7496313083f42f5bc655c90a9a1314cbb2
File description: Password-protected Word doc with macro to retrieve malware

SHA256 hash: 8dcde14308b6a7edff44fa2ac0aa2e672104db6d35f37ac93452944323468e5e
File description: Follow-up malware – Hermes ransomware

Also Read

New Version of GandCrab Ransomware Attack via Compromised Websites using SMB Exploit Spreader

Hackers Distributing Malicious PDF that Perform both Ransomware and Crypto-Mining Attack

New Version of SamSam Ransomware Attack Targeted Victims with Sophisticated Evasion Techniques

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Paragon Spyware Allegedly Ends Spyware Contract with Italy

Paragon Solutions, an Israeli cybersecurity firm, has reportedly ended its spyware contract with Italy.The...

Authorities Arrested Hacker Who Compromised 40+ Organizations

Spanish authorities have arrested a hacker believed to be responsible for cyberattacks targeting over...

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

OpenAI may have become the latest high-profile target of a significant data breach.A...

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Globe Life Ransomware Attack Exposes Personal and Health Data of 850,000+ Users

Globe Life Inc., a prominent insurance provider, has confirmed a major data breach that...

New ‘SHIELD’ Platform Leverages FPGA and Off-Host Monitoring to Tackle Advanced Ransomware Threats

In a significant advancement against increasingly sophisticated ransomware threats, researchers from NYU Tandon School...

New York Blood Center Targeted by Ransomware, IT Operations Impacted

New York Blood Center Enterprises (NYBC), one of the nation’s largest blood donation and...