What's Hot

    Ashok Sharma was awarded by Noon as Iconic Enterprise Entrepreneur in Dubai which was marked by the presence of many Bollywood celebrities, Enterprise man and well-known personalities

    November 27, 2022

    Suresh Kumar Kosagi was awarded as Noon greatest capital administration advisor by Esha Khoplekar in Dubai which was marked by the presence of many Bollywood celebrities, businessmen, and well-known personalities.

    November 26, 2022

    Atlassian Confluence Bug Beneath Lively Exploit

    July 28, 2022
    Facebook Twitter Instagram
    • About Us
    • Contact Us
    • Disclaimer
    • Terms and Conditions
    • Privacy Policy
    Facebook Twitter Instagram
    Bluebear-CyberBluebear-Cyber
    • Home
    • News
    • Top
      • Top 10 Brands
      • Top 20 Brands
    • Brand
      • Brand Listing
      • Brand Information
    • Press Release
    • Promotion And Offer
    • More
      • Best Products
      • Product Rating
      • Reviews
    Bluebear-CyberBluebear-Cyber
    Home»Uncategorized»Robin Hood Ransomware ‘GOODWILL’ Forces Sufferer for Charity
    Uncategorized

    Robin Hood Ransomware ‘GOODWILL’ Forces Sufferer for Charity

    EditorBy EditorJune 26, 2022No Comments4 Mins Read

    Goodwill Ransomware, recognized by CloudSEK researchers in March 2022, is thought to advertise social justice on the web. It’s identified to encrypt paperwork, databases, movies, or images after it infects the entire system. The information change into inaccessible for the victims, the place Robinhood’ Goodwill’ asks the sufferer to donate for socially pushed actions to get their information again. For instance: ‘Goodwill Ransomware forces victims to donate new garments to the homeless, present monetary help to the poor, and lots of extra. They then ask victims to publish it on-line.  

    Nonetheless, just a few extra ransomware produce other motives to power victims to do some act to retrieve their contaminated information. Fast heal revealed a weblog about Sarbloh Ransomware associated to the Farmer Protests and was not demanding any ransom. Equally, Goodwill ransomware acts as a Robin Hood and forces victims to assist the poor. Allow us to look into extra element about this ransomware and the way the attacker will get maintain of the information within the system. 

    Technical Evaluation 

    Allow us to analyse the hash (MD5: cea1cb418a313bdc8e67dbd6b9ea05ad). This can be a .NET Compiled file. This executable is full of Fody; therefore we are able to see solely the principle routine.
    We will additionally observe references to Costura. 


    Fig 1: Costura References 

    This Costura is a plugin for Fody that permits the builders to embed all of the dependencies within the type of assets packed inside the ultimate dotNET executable.  

    Fig2: Plugin 

    It may be seen within the above picture how the embedded dependencies are fetched and unpacked. 

    Upon execution it connects to URL hxxp[:]//9855-13-235-50-147.ngrok[.]io/alertmsg[.]zip and downloads alertmsg.zip file into location: C:UsersPublicWindowsUi 

    All of the content material associated to Ransom notes and encryption data is within the zip file. This executable coordinates with the contents of the zip. It encrypts the information with the extension “.gdwill.” 

     To recuperate the information, 3 actions have to be carried out as proven under: 

     

     

        

    Fig 3:  Ransom be aware 

     

    After finishing all of the given actions, the main points have to be despatched to the e-mail within the under format: 

    Fig 4: E-mail Format 

    The ransomware attackers ask the victims to offer convincing proof for the actions to show it carried out. After which, the particular person orchestrating this risk will present a decryption device to recuperate the stolen information. Allow us to take a look at how the risk actors hack and encrypt the information by way of the given under snapshot. 

    Fig 6: Encryption 

    Encryption Course of

     1.GeneratePassword: A password is randomly generated after which base64 encoded. The SHA256 of this base64 encoded information which later types the important thing for encryption (AES) 

    2. GenerateSystemId: SystemID of the sufferer’s machine is obtained 

    3. CheckConnection: Pings google.com and checks if the web is working 

    4. MakeConnection: Uploads the password and SystemID to the server together with location and IP 

    5.RetrieveFiles: AES Encryption is finished on information with extension with a key generated in Step1 .pptx,.docx,.xlsx,.txt,.pdf,.500,.jpeg,.jpg,.png 

    6. AlertingUser: Launches index.html(containing ransom be aware) by way of launch.bat current within the alertmsg.zip 

    Fig 7: Batch file for alert 

    This malware additionally sleeps for just a few seconds to bypass the evaluation. 

    Finally, it was discovered that this ransomware was derived from an Open-source Jasmin Encryptor, which may be discovered on https://github.com/codesiddhant/Jasmin-Ransomware. 

    How will we stop such sorts of assaults? 

    To maintain ourselves safe from such assaults, observe the nice saying  “Prevention is healthier than Remedy”! The an infection vector is often within the type of mails, so don’t open attachments from an untrusted sender. Don’t allow macros within the Doc obtained primarily from correspondences. Keep away from clicking on unverified hyperlinks and people in spam emails. Hold your software program and antivirus up to date. At all times keep in mind to again up your information so to recuperate it even in case of a ransomware assault. 

     Conclusion

    Within the content material above, we have now appeared into how Goodwill Ransom is expounded to Open-source Jasmin. It has modified the open-source for, e.g., In Jasmin, information are encrypted with the “.jasmin” extension, whereas GoodWill information are encrypted with “.gdwill.” In Jasmin, hosted factors to localhost, whereas Goodwill factors to exterior C2. This ransomware was distinctive due to its charitable nature as an alternative of demanding cash. The strings current within the file, comparable to “Error h bhaiyya,” appears that the routes of this hack had been generated in India.  

     Indicators of compromise (IOC) 

    • cea1cb418a313bdc8e67dbd6b9ea05ad 

     QuickHeal Safety 

    Trojan.YakbeexMSIL.ZZ4 

    Tejaswini Sandapolla

    Tejaswini Sandapolla


    Follow @

    Share. Facebook Twitter LinkedIn

    Related Posts

    Ashok Sharma was awarded by Noon as Iconic Enterprise Entrepreneur in Dubai which was marked by the presence of many Bollywood celebrities, Enterprise man and well-known personalities

    November 27, 2022

    Suresh Kumar Kosagi was awarded as Noon greatest capital administration advisor by Esha Khoplekar in Dubai which was marked by the presence of many Bollywood celebrities, businessmen, and well-known personalities.

    November 26, 2022

    Atlassian Confluence Bug Beneath Lively Exploit

    July 28, 2022

    Commit Digital 2021: The Way forward for Cloud-Native Safety

    July 28, 2022
    Add A Comment

    Leave A Reply Cancel Reply

    2 + 19 =

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Editors Picks

    Bodily Safety Half 1: Intro and Website Limitations

    May 30, 2022

    34C3 – Safety Nightmares 0x12

    May 30, 2022

    kleiner & großer Safety Schein / §34a Schein / Was gibt es wirklich, und wie bekomme ich die?

    May 30, 2022

    Safety Dashboard Demo

    May 30, 2022
    Latest Posts

    IndiGo airplane sure for Phuket compelled to return to Delhi attributable to hydraulic system failure

    January 3, 2023

    Lamborghini Urus Performante in India: Rs 4.22 crore beginning value, extra energy, much less weight

    November 25, 2022

    How unlawful automotive modification can land you in jail like this Mahindra Thar proprietor

    November 25, 2022
    Advertisement

    Bluebear-Cyber is a place covering all the field which includes Phone Security,Web Securit,Pc Security,Antivirus protection and many more. it is covering every sector from top to bottom.
    We're social. Connect with us:

    Trending News

    In Pics | Toyota Innova Hycross unveiled: Mileage, hybrid variants, anticipated worth

    November 25, 2022

    Royal Enfield 650 set to get a brand new rival? BSA 650 Scrambler idea breaks cowl

    November 25, 2022

    IIT Bombay’s Entrepreneurship Cell launches twenty fifth version of Eureka!

    October 19, 2022
    © Copyright 2023 Blue Bear Cyber.
    • About Us
    • Contact Us
    • Terms and Conditions
    • Privacy Policy
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.