..ok. The ransomware is responsible for files’ encryption and i
The analysed sample is a malware employed by the Threat Actor known as _Ragnarok. _The ransomware is responsible for files’ encryption and it is typically executed, by the actors themselves, on the compromised machines. The name of the analysed executable is
xs_high.exe
, but others have been found used by the same ransomware family (such as
xs_normal.exe
and
xs_remote.exe
).
The configuration within the malware contains information regarding the encryption activities, from whitelisted countries to the contents of the ransom note. It is interesting to note that the same configuration has been used across different victims, suggesting that the actor’s activities are not specifically tailored to them.
The ransomware is a DLL named
cry_demo.dll
, which is packed inside the
xs_high.exe
executable. The unpacking process takes place with self-injection (also known as PE-overwrite), an injection technique that does not involve spawning new processes or threads. All the packed DLL code is contained in the .data section of the
xs_high.exe
executable and will get unpacked and decrypted by a custom loader before being executed.
Link 1
Malware Analysis: Ragnarok Ransomware – YLabs:
https://labs.yarix.com/2021/04/malware-analysis-ragnarok-ransomware