Categories: Ransomware

New Variant of Scarab Ransomware Distributed via RDP on Systems and Servers

Security researchers from Malwarebytes detected Scarab ransomware variant distributed through RDP and used AES algorithm for encryption. The Scarabey variant is written in Delphi and it is identical to Scarab version the only change is the addresses of code and memory data references.

The popular version of the Scarab Ransomware distributed by a Necurs botnet and it is written in C. Scarabey found targetting Russian users and is designed same as like any other ransomware demanding Bitcoin.

The main difference between them is the ransom note, with Scarab it is written in English and on Scarabey it is written in Russian. Scarab uses to warn the users to make payment soon else the price will increase, on the other hand, Scarabey warns more and more files will be encrypted.

Researchers said There is no backdoor or remote access code in scarab or its variants, which makes the threat of deleting files on victim’s computer impossible.

Execution Flow – Scarabey

It checks with the parameters before executing to ensure this is the first run, also it makes sure there is key process is running. If any key process found it kills the process to avoid having the file locked.

Encryption loops called multiple sections in the code, but the main loop performs the majority of the encryption. It goes through all the folders if the file is not .exe or .dll it encrypts and changes to the .scarab extension.

It doesn’t use crypto  APIs instead it uses AES algorithm for encryption. Malwarebytes provided technical analysis of the ransomware.

“The key used to encrypt changes from file to file. Meaning that two files with identical content will be different after encryption. Essentially what happens is that there is an initial key and many subkeys are derived from that key.
If just a single encryption key was used for all of the files, you would be able to capture the memory at any point in the encryption process, save the key, and use it to decrypt all of the files on your hard drive. Unfortunately, because of this key cycling that Scarab performs, it makes decryption of the files likely impossible.” researchers said.

Once the disk drive encryption completed it calls to the enumeration functions to locate the network drives and folders.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

4 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago