1. Analysis of TellYouThePass

1.1 Introduction

Sangfor FarSight Labs recently detected a new TellYouThePass ransomware attack using the Omni-Command XDR platform. Analysis revealed that the attacker gained initial access to the system by using fileless malware, which was executed entirely in memory across the attack chain and was enhanced with an EDR evasion module.

Introduction of New TellYouThePass Ransomware Variant

According to the transaction records of the Bitcoin wallets extracted from the sample, two victims may have paid ransom to the TellYouThePass ransomware group on March 20th and 21st.

Introduction of New TellYouThePass Ransomware Variant 2

1.2 Sample Analysis

1.2.1 Attack process

The attacker used an automated vulnerability exploitation tool to scan external-facing services for exploitable vulnerabilities. Once discovered, they exploited the vulnerability to execute a malicious script, which loaded the core malicious module through reflection. This module integrates multiple open-source privilege escalation modules and an EDR evasion module, all of which were loaded through reflection or memory injection.

New TellYouThePass Ransomware Variant attack process

1.2.2 Sample Logic

The attack begins with a malicious script named d.hta, which is embedded with a serialized .NET class encoded in base64.

New TellYouThePass Ransomware Variant sample logic

The reflection-loaded class attempts to escalate privileges through built-in open-source Windows privilege escalation modules. If all attempts fail, the program terminates.

New TellYouThePass Ransomware Variant 5

Built-in privilege escalation modules include BadPotato, EfsPotato, GodPotato, PingCastle, Potato, PrintNotifyPotato, SharpToken, and SweetPotato.

New TellYouThePass Ransomware Variant 6

Then, two files with valid signatures are released in the temp directory, with their CheckSum fields randomly generated. This approach allows for the polymorphic modification of subsequent shellcode host process files without compromising the validity of their signatures. The released files are then executed to inject and run the shellcode.

New TellYouThePass Ransomware Variant 7

The injected module comes from the open-source EDR evasion tool RealBlindingEDR, which can evade, disable, and kill a variety of security software.

New TellYouThePass Ransomware Variant 8

Next, the encrypted ransomware module and its corresponding decryption module are released. The encryption and decryption keys are generated during runtime and passed via command-line parameters to the decryption module, which is responsible for launching the ransomware module.

New TellYouThePass Ransomware Variant 9

The decryption module uses the provided key parameters to decrypt the ransomware module and loads it using reflection.

New TellYouThePass Ransomware Variant 10

In addition, the sample retains a historical launch method that directly releases an unencrypted EXE version of the ransomware module and launches it using the command line. This method was not used in this sample.

New TellYouThePass Ransomware Variant 11

The ransomware's configuration is as follows: Encrypted files are appended with the .locked extension, the ransom note is named READ_ME5.html, etc.

New TellYouThePass Ransomware Variant 12

1.3 Indicators of Compromise (IOCs)

URL:

107.175.127.195:80

Hashes:

48f1495b4e7801352b56cb7baa5c27a9
25753e9136077d46199bfb3fa1311bfd
2539b7b9d1b88d613126e9968a52787b
6a450113e6b097a0ea07593b7b606790
 

Bitcoin Address:

bc1qnuxx83nd4keeegrumtnu8kup8g02yzgff6z53l

2. Solutions

2.1 Ransomware Prevention Strategies

  1. Perform regular vulnerability scans and security assessments and promptly update systems and applications to fix known vulnerabilities.
  2. Do not open suspicious or unexpected emails, especially the links and attachments in them. Use antivirus software to scan an unknown file before opening it (if you have to do so).
  3. Install antivirus software, perform regular system scans, remove detected threats, and regularly install updates and patches.
  4. Download products via official and verified channels, and activate and update products using tools or functions provided by the official developer. Illegal activation tools and third-party downloaders are not recommended, as they are often used to distribute malicious content.

2.2 Sangfor Solutions

2.2.1 Sangfor Endpoint Secure

Sangfor Endpoint Secure detects and blocks TellYouThePass ransomware files using dynamic and static AI-based detection engines. The static AI engine blocks unknown ransomware files when they land on endpoints, while the dynamic AI engine defends against ransomware payload execution. This combination achieves a 100% detection accuracy of known ransomware and 99.83% detection accuracy of unknown ransomware in as little as 3 seconds. Protection is provided without updates. However, it is recommended to update to the latest version for enhanced protection.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

New Mallox Ransomware Variant Discovered In The Wild

Date : 12 Mar 2024
Read Now

Multiple Vulnerabilities in VMware Products (CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, and CVE-2024-22255)

Date : 08 Mar 2024
Read Now

CVE-2024-21413: Microsoft Outlook Remote Code Execution Vulnerability

Date : 24 Feb 2024
Read Now

See Other Product

Best Darktrace Cyber Security Competitors and Alternatives in 2024
Sangfor Omni-Command
Cyber Command - NDR Platform
Endpoint Secure
Internet Access Gateway (IAG)
Sangfor Network Secure - Next Generation Firewall