Ahmed Sonbol

Detecting Ransom32 using Security Analytics

Discussion created by Ahmed Sonbol Employee on Jan 13, 2016

Ransom32 is a new ransomware malware family that comes packaged as an NW.js application. NW.js is a framework that lets developers use javascript to create desktop applications that can run on Windows, Mac OS X and Linux. Having an OS independent ransomware, or any malware for that matter, is quite interesting. However, its host and network behavior is still similar to other ransomware families. In this blog post, we will discuss how to detect its network traffic using RSA Security Analytics.

 

Among the different components that get installed on a system infected with Ransom32, there is a Tor client responsible for the communication with the command and control server hidden in the Tor network. This is how the traffic looks in Security Analytics:

 

ransom32.png

 

 

The SSL handshake between the client and the server is using a certificate with an anomalous certificate authority field. The value of the SSL CA key is a URL that starts with ‘www.’. Please note that this network behavior is not exclusive to Ransom32.

 

The following query can be used to detect Ransom32 network activity:

             ssl.ca begins ‘www.’ && tcp.dstport = 9001

 

Scan results for a Ransom32 can be found here. You can read more about Ransom32 here.


Outcomes