📜 ⬆️ ⬇️

Petya.A, Petya.C, PetrWrap or PetyaCry? New virus threat for companies in Russia and Ukraine

Not so long ago, we released an article on integrated proactive protection against targeted attacks and encryption viruses, which included the latest major virus infections of malware such as Ransomware. We can add another example to the piggy bank.

June 27, 2017 registered a massive hacker attack on servers and workstations of networks of large Russian, Ukrainian companies and organizations around the world, the list of which is being replenished continuously and more and more similar photos appear on social networks:


')
The virus is a modification of the 2016 extortioner Petya.A / Petya.C, which has been acclaimed in 2016. The new Petya.C virus is spreading in several ways:


When a user opens malware attached to an e-mail disguised as a document (these can be Order-20062017.doc files (or another date), myguy.xls, or modifications), the computer calls 84.200.16 [.] 242, downloading the malicious the Myguy.xls file to the root of the C: \ drive. After downloading, the following operations occur:


After the reboot, the user is shown a window demanding payment of $ 300 in Bitcoin equivalent to the wallet 1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX. At 23:30, the attackers had already transferred 3.277 BTC (paid by 31 people), at the current rate (at the time of publication, 1 BTC is equivalent to $ 2,409) it is $ 7894.

How to protect yourself from data encryption?


The first step is to update the anti-virus software signatures on servers and workstations (if anti-virus software is available) - the signature database should be updated on 06/27/2017 no earlier than 20:00 (the first mentions of adding Petya.C to the signature database started arriving at 19h). Here is a list of malicious files and their hash values:


On already infected systems, the specified files are located in the file system in the following folders:


In the malware's code, experts found an interesting opportunity to protect against Petya.C by manually creating the C: \ Windows \ perfc.dll file using a standard Notepad.

In addition to updating antivirus software, we recommend that you apply additional protection measures:


What to do after infection?


In no case do not transfer money to the account of the attackers, their email is blocked, and in any case you will not be able to recover the data in this way.
When infecting a workstation / server on the network, it is necessary to take appropriate measures to eliminate malware:


Data from hard drives encrypted with the old Petya virus was recovered as follows . The descrambler for the old version of Petya was published on Github . Decoder for the new version of Petya.C yet.

Detection of the spread of the virus over the network


In the course of distribution over the network, a version of the Microsoft Windows Sysinternals tool, PsExec, is supposedly used.

There is a SIGMA rule for detecting PsExec usage, it can be automatically converted to a Splunk and ElasticSearch request:

title: PsExec tool execution on destination host
status: experimental
description: Detect PsExec installation and execution events (service and Sysmon)
author: Thomas Patzke
reference: www.jpcert.or.jp/english/pub/sr/ir_research.html
logsource:
product: windows
detection:
service_installation:
EventID: 7045
ServiceName: 'PSEXESVC'
ServiceFileName: '* \ PSEXESVC.exe'
service_execution:
EventID: 7036
ServiceName: 'PSEXESVC'
sysmon_processcreation:
EventID: 1
Image: '* \ PSEXESVC.exe'
User: 'NT AUTHORITY \ SYSTEM'
condition: service_installation or service_execution or sysmon_processcreation
falsepositives:
- unknown
level: low

An epidemic again?


The reason for the wide spread of the virus is the failure to implement the basic necessary measures to protect against targeted attacks of this kind:


Organizational measures cannot provide reliable and effective protection against targeted attacks and extortionate software; therefore, a set of technical measures is required, which we described in our previous article.

Author: Evgeny Borodulin, Chief Architect, Informzaschita
e.borodulin@infosec.ru

Source: https://habr.com/ru/post/331788/


All Articles