Egregor Ransomware

Egregor Ransomware

Egregor is a ransomware from the Sekhmet malware family that has been active since the middle of September 2020. The ransomware group hacks into companies, steals information, and finally encrypts all the data.

The level of sophistication of their attacks, adaptability to infect such a broad range of victims, and significant increase in their activity suggests that Egregor ransomware operators have been developing their malware for some time and are just now putting it to (malicious) use.

Egregor is probably the most aggressive ransomware family in terms of negotiation with the victims. Its operators give only 72 hours to contact them. If the ransom is not paid, the data is released to the public via the attacker’s website, “Egregor News.”

The ransomware payment is negotiated and agreed upon via a special chat function assigned to each victim. The payment is received in bitcoin.

The information available so far suggests that the initial infection starts with a phishing email that contains a malicious macro embedded in an attached document.

Message shown to infected users

Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.

Leverage Pretty Good Privacy in mail communications. Additionally, encrypt or protect the sensitive document stored in the internet-facing machines to avoid potential leakage

Maintain updated anti-virus software on all systems and don’t open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail.

It also suggested that security managers should disable remote desktop connections/limiting users who can log in using remote desktop and setting an account lockout policy  and employ least-privileged accounts.

Known Indicators of Compromise (IoCs):

Indicator of compromise (IoC) in computer forensics is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion.

91[.]199[.]212[.]52

49[.]12[.]104[.]241

45[.]153[.]242[.]129

185[.]238[.]0[.]233

Crt[.]sectigo[.]com

hxxp://49[.]12[.]104[.]241:81/78.bin

hxxp://49[.]12[.]104[.]241/sm.dll

hxxp://49[.]12[.]104[.]241:81/sm.dll

03cdec4a0a63a016d0767650cdaf1d4d24669795

069ef8443df750e9f72ebe4ed93c3e472a2396e2

072ab57f9db16d9fb92009c8e10b176bd4a2eff01c3bc6e190020cf5a0055505

07d4bcb5b969a01fb21dc28e5cb1b7ceb05f2912

16a9c2917577e732cd6630b08e248443

1a722cde21a4338b26bc37401ef963022d97cea141c985e6615a10287f8d02ff

1cce0c0d67fe7f51f335a12138698403

28f3f5a3ea270d9b896fe38b9df79a6ca430f5edab0423b3d834cf8d586f13e6

2d01c32d51e4bbb986255e402da4624a61b8ae960532fbb7bb0d3b0080cb9946

386cf4e151bc7510c3333eb1a5c96ab1b7becd8cfb94bcb76e93458078daf66f

3dba9fbef8f8a42ecfa65022b8a3c54738d15ef67c666272078b58b3c9a0a414

410afc5daebd7b39410b046286b814bb5fb5f9139167cd310bc59cc4461d4083

43445fbe21cf3512724646a284d3e5d7

49b3d9c3bd6b6a13f89f0e849d80531454cc5cd259cbb7c8a806c67cd403575e

4c36c3533a283e1aa199f80e20d264b9

5455d104e693445dce5567236f4e047617bae7f09d5ca8699a838c2d17d37fb3

561092877e91f2741ed061cbe7a57d1af552b600c6654ccc588cb6bff7939152

5f9fcbdf7ad86583eb2bbcaa5741d88a

605c2047be7c4a17823ad1fa5c1f94fd105721fce3621dc9148cd3baf352938e

627c2219a80245a25e4fe9843ac2a021

65c320bc5258d8fa86aa9ffd876291d3

7222c8acc69a7598989c335d528b366f801a41b434cbf928c6aef01f8e54f57a

7bc6c2d714e88659b26b6b8ed6681b1f91eef6af

7caed5f406445c788543f55af6d98a8bc4f0c104e6a51e2564dd37b6a485cc18

7dd1a1a0eefc5a653a30010f475cc37c

9fffabede0ef679970666f04184340437cd70bc8fe870ee8174713ececf32398

a654b3a37c27810db180822b72ad6d3e

ac634854448eb8fcd3abf49c8f37cd21f4282dde

b027467332243c8186e59f68ff7c43c9e212d9e5074fedf003febcfedad4381a

b554791b5b161c34b0a7d26e34a88e60

b81d2293b43decd5a401487da952deb32cbb53f118882b97b457a14c67029247

b9dcee839437a917dde60eff9b6014b1

bd8c52bb1f5c034f11f3048e2ed89b7b8ff39261

c1c4e677b36a2ee6ae858546e727e73cc38c95c9024c724f939178b3c03de906

c9d46c319ed01c183598f7b9a60b9bca34b2eea989f4659e9aa27c7a1bf8681c

d2d9484276a208641517a2273d96f34de1394b8e

d6fa64f36eab990669f0b81f84b9a78a

e0caae0804957c5e31c53dd320ca83a5465169c9

e27725074f7bc55014885921b7ec8b5319b1ef8f

e3ef50749f144bfd7f5d7d51aaa9e2332b706c4d8ac130fdc95f50662525f6e0

ed5b60a640a19afe8d1281bf691f40bac34eba8a

f0215aac7be36a5fedeea51d34d8f8da2e98bf1b

f1ba626b8181bd1cd84f47f70838d9fa4d8117fac3bd07cbd73cb6f73b1297f8
f7bf7cea89c6205d78fa42d735d81c1e5c183041

5a346fb957abeba389424dc57636edcacc58b5ba

901cee60fba225baf80c976b10dfa1684a73f5ee

a6259615ea10c30421e83d20f4a4b5f2c41b45b8

03cdec4a0a63a016d0767650cdaf1d4d24669795

4ea064f715c2a5f4ed68f57029befd8f406671dd

ac634854448eb8fcd3abf49c8f37cd21f4282dde

7bc6c2d714e88659b26b6b8ed6681b1f91eef6af

0579da0b8bfdfce7ca4a45baf9df7ec23989e28b

3a33de9a84bbc76161895178e3d13bcd28f7d8fe

f7bf7cea89c6205d78fa42d735d81c1e5c183041

986f69a43e0bf174f73139785ec8f969acf5aa55

f1603f1ddf52391b16ee9e73e68f5dd405ab06b0

5a346fb957abeba389424dc57636edcacc58b5ba

901cee60fba225baf80c976b10dfa1684a73f5ee

a6259615ea10c30421e83d20f4a4b5f2c41b45b8

4ea064f715c2a5f4ed68f57029befd8f406671dd

f73e31d11f462f522a883c8f8f06d44f8d3e2f01

ac6d919b313bbb18624d26745121fca3e4ae0fd3

95aea6b24ed28c6ad13ec8d7a6f62652b039765e

a786f383dfb90191aa2ca86ade68ee3e7c088f82

631924a3567390a081dbd82072a6fc3a185c5073

1be22505a25f14fff1e116fafcaae9452be325b1

a2d5700def24c3ae4d41c679e83d93513259ae4a

34a466a0e55a930d8d7ecd1d6e6c9c750082a5fe

2edaa3dd846b7b73f18fa638f3e1bc3a956affa4

Reference:

Share