A Mamba Ransomware that was badly infected the San Francisco Train System On Nov 2016, now Mamba is again back to form that resumed its attack vector against Corporate Networks.
A legitimate full disk encryption Utility called DiskCrypto used for this attack and uses the psexec utility to execute the Mamba Ransomware by the group behind of this Dangerous Ransomware.
As per the Current Observation this Ransomware attack against most of the Corporate networks that belong to Brazil and Saudi Arabia.
This Threat generates a password for the DiskCrypto Utility for each machine in the targeted network and then finally ransomware utilizes the password that has been passed via command line argument.
Example of the Malware Execution Command line
Also Read: Ransomware attack hit San Francisco train system
Mamba Execute its attack by using Two Stages that are Preparation and Execution.
First Stage “Preparation” Performs an installation Process of this Tool on a targeted Victims Machine by using the DiskCrypto Utility.
Once Tool will Installed the malicious dropper stores in the own Process of the DiskCryptor’s modules.
DiskCrypto Utility Module
“According to Karspersky Labs ,Depending on OS information, the malware is able to choose between 32- or 64-bit DiskCryptor modules. The necessary modules will be dropped into the “C:\xampp\http” folder.”
Once Malware Drops All the necessary Modules in the Concern Folder, finally it launches the dropped DiskCryptor installer.
Dropped DiskCryptor installer calls
After the DiskCryptor installer launched, Malware Create SERVICE_ALL_ACCESS and SERVICE_AUTO_START parameters then finally reboot the system in end of the First Stage.
Parameter Create Function for For Force Reboot
In the Second Stage, This Ramsomware set up the new bootloader to MBR. New Bootloader contains the Ransom information for the Victims.
Ramsom Information
So, Disk Partitions will be Encrypted with Password once NewBootLoader is set.
Finally, After the encryption ends then the system will be rebooted and Victims will receive the Ransomware note on the Screen.
Ransom Note on the screen
This Ransom Detected as PDM:Trojan.Win32.Generic. by Kaspersky Lab Researchers.
Unfortunately, there is no way to decrypt data that has been encrypted using the DiskCryptor utility because this legitimate utility uses strong encryption algorithms.Kaspersky said.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…