Saturday, February 8, 2025
HomeRansomwareNew Version of SamSam Ransomware Attack Targeted Victims with Sophisticated Evasion Techniques

New Version of SamSam Ransomware Attack Targeted Victims with Sophisticated Evasion Techniques

Published on

SIEM as a Service

Follow Us on Google News

A new version of the SamSam Ransomware Attack targeting the specific victims that selected by the Malware author and it contains a variety of unique future unlike other ransomware and it evades the detection using more sophisticated techniques.

It makes very harder to detect and track back after launching its attack since it employees the more advanced techniques.

Unlike old version of the SamSam Ransomware Attack, new version used a different module and it interacted with one another which we will discuss further elaborately.

For a successful attack, you should enter the password manually to execute this ransomware in specifically chooses victims machine.

Malware author using the clever trick that makes no one can analyze the ransomware code even we cannot even execute the ransomware on a victim or test machine which means that only the author can execute the code.

Also, you won’t get infected if the file accidentally downloads and executes in your computer because a password is required for the payload to run that should be given by the attacker.

Malware Author of this new version of the SamSam Ransomware Attack used it for a single purpose which means it used only for targeted attacks.

The creator of this ransomware has particularly picked the victims, also this is the thing that makes this ransomware so intriguing.

SamSam Ransomware Attack Working Function

SamSam Ransomware using 5 main component in order to compromise the victims and 4 of them are actual files and remaining one is direct human involvement.

The first component contains batch files which are having some settings and it required actual human involvement portion that should be executed manually by Malware author.

The attacker executes the bat file on the compromised computer with a password as its command-line parameter.

It Receives the password via command line parameter from an attacker and password will be entered without the use of the files.

Since its a manual attack, it very difficult to analysis on the main payload and reconstructing the full manual attack scenario because some files and logs are wiped afterward by the attacker.

The second Component is “runner,” which is used to decrypt and launching the Payload which is quite simple and no obfuscation functionality has been involved.

According to Malwarebytes,  It searches directories for a file with an extension of .stubbin that will have been placed there by the attacker. The stubbin file is the encrypted ransomware. It immediately reads the bytes from the file and then deletes the file from the disk.

The third Component contains the separate DLL for decryption code which is not having within the old version and it was contained within Runner EXE.

Finally, component four, the contents of the encrypted malware payload, *.stubbin that will launch into the victim’s machine and encrypt the disk file and demand the ransom.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Abyss Locker Ransomware Attacking Critical Network Devices including ESXi servers

The Abyss Locker ransomware, a relatively new but highly disruptive cyber threat, has been...

Globe Life Ransomware Attack Exposes Personal and Health Data of 850,000+ Users

Globe Life Inc., a prominent insurance provider, has confirmed a major data breach that...

New ‘SHIELD’ Platform Leverages FPGA and Off-Host Monitoring to Tackle Advanced Ransomware Threats

In a significant advancement against increasingly sophisticated ransomware threats, researchers from NYU Tandon School...